Sciweavers

708 search results - page 128 / 142
» Finding a Path to Model Consistency
Sort
View
MONET
2006
129views more  MONET 2006»
13 years 8 months ago
Enabling Intelligent Handovers in Heterogeneous Wireless Networks
In the future Wireless Internet, mobile nodes will be able to choose between providers offering competing services at a much finer granularity than we find today. Rather than month...
Robert C. Chalmers, Govind Krishnamurthi, Kevin C....
TCOM
2008
92views more  TCOM 2008»
13 years 8 months ago
Mailbox switch: a scalable two-stage switch architecture for conflict resolution of ordered packets
Abstract-- Traditionally, conflict resolution in an inputbuffered switch is solved by finding a matching between inputs and outputs per time slot. To do this, a switch not only nee...
Cheng-Shang Chang, Duan-Shin Lee, Ying-Ju Shih, Ch...
USS
2010
13 years 6 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
CHI
2004
ACM
14 years 9 months ago
Unintended effects: varying icon spacing changes users' visual search strategy
Users of modern GUIs routinely engage in visual searches for various control items, such as buttons and icons. Because this is so ubiquitous, it is important that the visual prope...
Sarah P. Everett, Michael D. Byrne
CGO
2008
IEEE
14 years 3 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss