Sciweavers

809 search results - page 147 / 162
» Growing a Build Management System from Seed
Sort
View
MDM
2009
Springer
269views Communications» more  MDM 2009»
14 years 3 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
ACMMSP
2005
ACM
101views Hardware» more  ACMMSP 2005»
14 years 2 months ago
Transparent pointer compression for linked data structures
64-bit address spaces are increasingly important for modern applications, but they come at a price: pointers use twice as much memory, reducing the effective cache capacity and m...
Chris Lattner, Vikram S. Adve
MATA
2000
Springer
137views Communications» more  MATA 2000»
14 years 9 days ago
Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents
Extensive research on mobile agents has been rife with the growing interests in network computing. In this paper, we have discussed a mobile multi-agent-based framework to address ...
Romit Roy Choudhury, Somprakash Bandyopadhyay, Kri...
ISSRE
2010
IEEE
13 years 7 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
WWW
2005
ACM
14 years 9 months ago
Ensuring required failure atomicity of composite Web services
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
Sami Bhiri, Olivier Perrin, Claude Godart