Sciweavers

832 search results - page 155 / 167
» Mutation of Java Objects
Sort
View
VIIP
2001
13 years 8 months ago
Collision Handling and Shadow Casting in Virtual-Prismaker
Abstract. Our research team is developing a computer construction game called VirtualPrismaker based on the physical game Prismakertm . We have had to deal with all typical and ess...
Víctor López-Jaquero, Antonio Fern&a...
SMARTNET
2000
13 years 8 months ago
Software Agent Constrained Mobility for Network Performance Monitoring
During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management a...
Christos Bohoris, Antonio Liotta, George Pavlou
DPD
2006
123views more  DPD 2006»
13 years 6 months ago
Reducing network traffic in unstructured P2P systems using Top-k queries
A major problem of unstructured P2P systems is their heavy network traffic. This is caused mainly by high numbers of query answers, many of which are irrelevant for users. One solu...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
IIE
2008
104views more  IIE 2008»
13 years 6 months ago
Exploring Technologies, Materials, and Methods for an Online Foundational Programming Course
Introductory computer programming courses are inherently challenging for a variety of reasons. With increased demands for online delivery, the use of effective technologies, materi...
Eman El-Sheikh, John W. Coffey, Laura J. White
SCP
2008
144views more  SCP 2008»
13 years 6 months ago
Implicit ownership types for memory management
Abstract. The Real-time Specification for Java (RTSJ) introduced a range of language features for explicit memory management. While the RTSJ gives programmers fine control over mem...
Tian Zhao, Jason Baker, James Hunt, James Noble, J...