Sciweavers

15792 search results - page 3012 / 3159
» Computational Abstraction Steps
Sort
View
ACMSE
2006
ACM
14 years 22 days ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
ACMSE
2005
ACM
14 years 22 days ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones
ATAL
2006
Springer
14 years 22 days ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
ICDCS
2010
IEEE
14 years 22 days ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
CONEXT
2006
ACM
14 years 22 days ago
Optimal design of high density 802.11 WLANs
Abstract: The provisioning of high throughput performance infrastructure wireless networks necessitates the deployment of a high density of Access Points. While the latter improves...
Vivek P. Mhatre, Konstantina Papagiannaki
« Prev « First page 3012 / 3159 Last » Next »