Sciweavers

136 search results - page 24 / 28
» Encouraging women in computer science
Sort
View
WMCSA
2008
IEEE
14 years 1 months ago
Low-bandwidth VM migration via opportunistic replay
Virtual machine (VM) migration has been proposed as a building block for mobile computing. An important challenge for VM migration is to optimize the transfer of large amounts of ...
Ajay Surie, H. Andrés Lagar-Cavilla, Eyal d...
ACSC
2005
IEEE
14 years 1 months ago
A Formal Approach to Component Adaptation and Composition
Component based software engineering (CBSE), can in principle lead to savings in the time and cost of software development, by encouraging software reuse. However the reality is t...
David Hemer
IEEECIT
2010
IEEE
13 years 5 months ago
An Innovative Course about Network Storage and System Virtualization Technologies in PKU
—“Network Storage and System Virtualization Technologies” is an up-to-date course opened by the school of electronics engineering and computer science of Peking University. T...
Xiaolin Wang, Xinxin Jin, Yingwei Luo, Zhenlin Wan...
TDSC
2011
13 years 2 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
BIRTHDAY
2009
Springer
14 years 2 months ago
Hybrid BDD and All-SAT Method for Model Checking
We present a new hybrid BDD and SAT-based algorithm for model checking. Our algorithm is based on backward search, where each pre-image computation consists of an efficient All-SA...
Avi Yadgar, Orna Grumberg, Assaf Schuster