Sciweavers

15792 search results - page 3012 / 3159
» Computational Abstraction Steps
Sort
View
ACMSE
2006
ACM
15 years 5 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
ACMSE
2005
ACM
15 years 5 months ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones
ATAL
2006
Springer
15 years 5 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
ICDCS
2010
IEEE
15 years 5 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
CONEXT
2006
ACM
15 years 5 months ago
Optimal design of high density 802.11 WLANs
Abstract: The provisioning of high throughput performance infrastructure wireless networks necessitates the deployment of a high density of Access Points. While the latter improves...
Vivek P. Mhatre, Konstantina Papagiannaki
« Prev « First page 3012 / 3159 Last » Next »