Sciweavers

1418 search results - page 230 / 284
» How to Explain Mistakes
Sort
View
COMCOM
2000
125views more  COMCOM 2000»
13 years 8 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
COMCOM
2000
115views more  COMCOM 2000»
13 years 8 months ago
Reducing the protocol overheads of LANE in the MPOA protocol
The ATM networks have been widely adopted as the backbone networks. LANE is adopted by the MPOA protocol for the intra-IASG communication. In LANE, the edge devices have become pe...
Wei Kuang Lai, Kuo-Her Lin
CLUSTER
2002
IEEE
13 years 8 months ago
File and Object Replication in Data Grids
Data replication is a key issue in a Data Grid and can be managed in different ways and at different levels of granularity: for example, at the file level or object level. In the ...
Heinz Stockinger, Asad Samar, Koen Holtman, Willia...
CMOT
2002
112views more  CMOT 2002»
13 years 8 months ago
Finding Optimal Targets for Change Agents: A Computer Simulation of Innovation Diffusion
We introduce a diffusion of innovation model based on a network threshold approach. Realistic network and threshold data were gathered regarding the diffusion of new software tool...
Dirk Maienhofer, Thomas A. Finholt
IJMMS
1998
137views more  IJMMS 1998»
13 years 8 months ago
A context model for knowledge-intensive case-based reasoning
: Decision-support systems that help solving problems in open and weak theory domains, i.e. hard problems, need improved methods to ground their models in real world situations. Mo...
Pinar Öztürk, Agnar Aamodt