Sciweavers

326 search results - page 10 / 66
» Experimenting different software architectures performance t...
Sort
View
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
13 years 11 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
ESA
2006
Springer
82views Algorithms» more  ESA 2006»
13 years 11 months ago
The Price of Resiliency: A Case Study on Sorting with Memory Faults
We address the problem of sorting in the presence of faults that may arbitrarily corrupt memory locations, and investigate the impact of memory faults both on the correctness and ...
Umberto Ferraro Petrillo, Irene Finocchi, Giuseppe...
ATAL
2004
Springer
14 years 27 days ago
A Case Study of Organizational Effects in a Distributed Sensor Network
We describe how a system employing different types of organizational techniques addresses the challenges posed by a large-scale distributed sensor network environment. The high-le...
Bryan Horling, Roger Mailler, Victor R. Lesser
WOSP
2005
ACM
14 years 1 months ago
Applying SPE techniques for modeling a grid-enabled JAVA platform
Advances in Internet and the availability of powerful computers and high-speed networks have propitiated the rise of Grids. The scheduling of applications is complex in Grids due ...
Mariela Curiel, M. Angélica Pérez, R...
HPDC
2007
IEEE
14 years 1 months ago
Scaling multiplayer online games using proxy-server replication: a case study of Quake 2
Massively Multiplayer Online Games (MMOGs) are an increasingly popular class of real-time interactive distributed applications that require scalable architectures and parallelizat...
Jens Müller 0004, Sergei Gorlatch, Tobias Sch...