Sciweavers

1583 search results - page 305 / 317
» Issues in data stream management
Sort
View
ISSTA
2009
ACM
14 years 2 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
NOMS
2008
IEEE
14 years 1 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
GEOS
2007
Springer
14 years 1 months ago
Modeling Spatio-temporal Network Computations: A Summary of Results
Spatio-temporal network is defined by a set of nodes, and a set of edges, where the properties of nodes and edges may vary over time. Such networks are encountered in a variety of...
Betsy George, Shashi Shekhar
OOPSLA
2007
Springer
14 years 1 months ago
Statistically rigorous java performance evaluation
Java performance is far from being trivial to benchmark because it is affected by various factors such as the Java application, its input, the virtual machine, the garbage collect...
Andy Georges, Dries Buytaert, Lieven Eeckhout
SIGCPR
2006
ACM
106views Hardware» more  SIGCPR 2006»
14 years 1 months ago
Cross-cultural influences on women in the IT workforce
A review of 862 papers published in SIGMIS/CPR proceedings over the past 44 years revealed only 29 articles that focused on gender and the IT workforce or gender and IT education,...
Eileen M. Trauth, Jeria L. Quesenberry, Haiyan Hua...