Sciweavers

3104 search results - page 575 / 621
» Competence-Based EE-Learning: (How) Can We Implement It
Sort
View
SIGSOFT
2007
ACM
16 years 5 months ago
Context-based detection of clone-related bugs
Studies show that programs contain much similar code, commonly known as clones. One of the main reasons for introducing clones is programmers' tendency to copy and paste code...
Lingxiao Jiang, Zhendong Su, Edwin Chiu
WWW
2004
ACM
16 years 5 months ago
Semantic email
This paper investigates how the vision of the Semantic Web can be carried over to the realm of email. We introduce a general notion of semantic email, in which an email message co...
Luke McDowell, Oren Etzioni, Alon Y. Halevy, Henry...
127
Voted
LCTRTS
2010
Springer
15 years 11 months ago
Contracts for modular discrete controller synthesis
We describe the extension of a reactive programming language with a behavioral contract construct. It is dedicated to the programming of reactive control of applications in embedd...
Gwenaël Delaval, Hervé Marchand, &Eacu...
INFOCOM
2008
IEEE
15 years 11 months ago
Swarming on Optimized Graphs for n-Way Broadcast
—In an n-way broadcast application each one of n overlay nodes wants to push its own distinct large data file to all other n-1 destinations as well as download their respective ...
Georgios Smaragdakis, Azer Bestavros, Nikolaos Lao...
ISCC
2007
IEEE
136views Communications» more  ISCC 2007»
15 years 10 months ago
Analysis of the IPv4 Address Space Delegation Structure
The Internet has grown tremendously in terms of the number of users who rely on it and the number of organizations that are connected to it. Characterizing how this growth affects...
Anusha Sriraman, Kevin R. B. Butler, Patrick Drew ...