Sciweavers

1835 search results - page 300 / 367
» Functional Programming of Behavior-Based Systems
Sort
View
CLUSTER
2002
IEEE
15 years 7 months ago
User-Level Remote Data Access in Overlay Metacomputers
A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be ...
Jeff Siegel, Paul Lu
ICDE
1996
IEEE
155views Database» more  ICDE 1996»
16 years 3 months ago
DSDT: Durable Scripts Containing Database Transactions
DSDT is a programming tool for writing durable scripts which contain short ACID transactions as components. The context of the script is made durable by writing a log record whene...
Betty Salzberg, Dimitri Tombroff
125
Voted
ICST
2009
IEEE
15 years 9 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
MM
2009
ACM
163views Multimedia» more  MM 2009»
15 years 9 months ago
Peer-assisted packet loss repair for IPTV video multicast
Emerging IPTV technology uses source-specific IP multicast to deliver TV programs to the end-users. To provide timely and reliable services over the error-prone DSL access networ...
Zhi Li, Xiaoqing Zhu, Ali C. Begen, Bernd Girod
88
Voted
ICRA
2007
IEEE
107views Robotics» more  ICRA 2007»
15 years 8 months ago
Job-agents: How to coordinate them?
– With our proposed decomposition into layers, a generic framework leading to the reuse of previously produced software and the extraction of useful portions can be achieved. The...
Niak Wu Koh, Cezary Zielinski, Marcelo H. Ang, Ser...