Sciweavers

1245 search results - page 220 / 249
» Playing with Conway's problem
Sort
View
COMPSAC
2005
IEEE
14 years 2 months ago
Preventing Illegal Usage of Mobile Phone Software
Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
Yun-Sam Kim, Eun-Sun Cho
AOSD
2005
ACM
14 years 2 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
GFKL
2005
Springer
167views Data Mining» more  GFKL 2005»
14 years 2 months ago
Quantitative Text Typology: The Impact of Sentence Length
Abstract. This study focuses on the contribution of sentence length for a quantitative text typology. Therefore, 333 Slovenian texts are analyzed with regard to their sentence leng...
Emmerich Kelih, Peter Grzybek, Gordana Antic, Erns...
NIME
2005
Springer
129views Music» more  NIME 2005»
14 years 2 months ago
Network Latency Adaptive Tempo in the Public Sound Objects System
In recent years Computer Network-Music has increasingly captured the attention of the Computer Music Community. With the advent of Internet communication, geographical displacemen...
Alvaro Barbosa, Jorge Cardoso, Gunter Geiger
TACAS
2005
Springer
113views Algorithms» more  TACAS 2005»
14 years 2 months ago
jETI: A Tool for Remote Tool Integration
Abstract. We present jETI, a redesign of the Electronic Tools Integration platform (ETI), that addresses the major issues and concerns accumulated over seven years of experience wi...
Tiziana Margaria, Ralf Nagel, Bernhard Steffen