Sciweavers

328 search results - page 36 / 66
» Are You Being Served
Sort
View
ICECCS
2009
IEEE
140views Hardware» more  ICECCS 2009»
14 years 3 months ago
Common Pitfalls of Using QVT Relations - Graphical Debugging as Remedy
OMG’s Model-Driven Architecture (MDA) has emerged as a new approach for the development of software. For this, the Query/View/Transformation (QVT) standard plays a central role,...
Angelika Kusel, Wieland Schwinger, Manuel Wimmer, ...
SERA
2009
Springer
14 years 3 months ago
Syntactic and Semantic Prediction in Dynamic Languages
In the context of computer programming, the importance of computer assistance is being understood by many developer communities. Developers are e.g. using the same well known expre...
Jakub Mísek, Filip Zavoral
SIGMETRICS
2009
ACM
149views Hardware» more  SIGMETRICS 2009»
14 years 3 months ago
On the treeness of internet latency and bandwidth
Existing empirical studies of Internet structure and path properties indicate that the Internet is tree-like. This work quantifies the degree to which at least two important Inte...
Venugopalan Ramasubramanian, Dahlia Malkhi, Fabian...
ICC
2008
IEEE
134views Communications» more  ICC 2008»
14 years 3 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
ICDCSW
2008
IEEE
14 years 3 months ago
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation
Emergence of successful teleoperation applications requires the convergence of diverse domains like robotics, machine learning, sensing, actuation, control and communication. We e...
Invited Talk Lakshamanan, Raj Rajkumar