Sciweavers

241 search results - page 39 / 49
» CACM: past, present, and future
Sort
View
WSC
2001
13 years 11 months ago
Security issues in high level architecture based distributed simulation
The United States Department of Defense (DoD) has, over the past several years, emphasized the need to employ simulation based acquisition (SBA) in engineering and development. Di...
Asa Elkins, Jeffery W. Wilson, Denis Gracanin
CCR
2006
154views more  CCR 2006»
13 years 10 months ago
Medium access control issues in sensor networks
Medium access control for wireless sensor networks has been a very active research area for the past couple of years. The sensor networks literature presents an alphabet soup of m...
Muneeb Ali, Umar Saif, Adam Dunkels, Thiemo Voigt,...
CIB
2002
100views more  CIB 2002»
13 years 9 months ago
Web-log Mining for Quantitative Temporal-Event Prediction
The web log data embed much of web users' browsing behavior. From the web logs, one can discover patterns that predict the users' future requests based on their current b...
Qiang Yang, Hui Wang, Wei Zhang
EC
2000
96views ECommerce» more  EC 2000»
13 years 9 months ago
Multiobjective Evolutionary Algorithms: Analyzing the State-of-the-Art
Solving optimization problems with multiple (often conflicting) objectives is, generally, a very difficult goal. Evolutionary algorithms (EAs) were initially extended and applied ...
David A. van Veldhuizen, Gary B. Lamont
ECOOP
1999
Springer
14 years 2 months ago
Inlining of Virtual Methods
We discuss aspects of inlining of virtual method invocations. First, we introduce a new method test to guard inlinings of such invocations, with a di erent set of tradeo s from the...
David Detlefs, Ole Agesen