Sciweavers

4033 search results - page 698 / 807
» Design patterns in enterprise
Sort
View
TMC
2008
164views more  TMC 2008»
15 years 3 months ago
Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks
Integrating mobile computing and localized user interaction into the Internet requires more than simply overcoming pure routing challenges. Apart from issues such as intermittent c...
Anargyros Garyfalos, Kevin C. Almeroth
JCP
2007
73views more  JCP 2007»
15 years 3 months ago
Investigating Shill Bidding Behaviour Involving Colluding Bidders
Abstract— Shill bidding is where spurious bids are introduced into an auction to drive up the final price for the seller, thereby defrauding legitimate bidders. Trevathan and Re...
Jarrod Trevathan, Wayne Read
TON
2008
239views more  TON 2008»
15 years 3 months ago
Characterization of failures in an operational IP backbone network
Abstract--As the Internet evolves into a ubiquitous communication infrastructure and supports increasingly important services, its dependability in the presence of various failures...
Athina Markopoulou, Gianluca Iannaccone, Supratik ...
CGF
2005
109views more  CGF 2005»
15 years 3 months ago
GeoFilter: Geometric Selection of Mesh Filter Parameters
When designing a lowpass filter to eliminate noise in a triangle mesh, the cutoff frequency is typically chosen by a cumbersome trial-and-error process. Therefore, it is important...
ByungMoon Kim, Jarek Rossignac
TSE
2008
99views more  TSE 2008»
15 years 3 months ago
Modular Information Hiding and Type-Safe Linking for C
This paper presents CMOD, a novel tool that provides a sound module system for C. CMOD works by enforcing a set of four rules that are based on principles of modular reasoning and...
Saurabh Srivastava, Michael Hicks, Jeffrey S. Fost...