Sciweavers

1801 search results - page 311 / 361
» Pointing without a pointer
Sort
View
ECOOP
2005
Springer
14 years 2 months ago
Pitfalls in Unanticipated Dynamic Software Evolution
Abstract. The authors of this paper have all developed a framework that allows runtime adaptation of software systems. Based on our experiences, we wish to summarize common pitfall...
Peter Ebraert, Theo D'Hondt, Yves Vandewoude, Yola...
ICS
2005
Tsinghua U.
14 years 2 months ago
The implications of working set analysis on supercomputing memory hierarchy design
Supercomputer architects strive to maximize the performance of scientific applications. Unfortunately, the large, unwieldy nature of most scientific applications has lead to the...
Richard C. Murphy, Arun Rodrigues, Peter M. Kogge,...
ISAAC
2005
Springer
76views Algorithms» more  ISAAC 2005»
14 years 2 months ago
Improved Algorithms for the k Maximum-Sums Problems
Given a sequence of n real numbers and an integer k, 1 k 1 2 n(n − 1), the k maximum-sum segments problem is to locate the k segments whose sums are the k largest among all poss...
Chih-Huai Cheng, Kuan-Yu Chen, Wen-Chin Tien, Kun-...
RAID
2005
Springer
14 years 2 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
RT
2005
Springer
14 years 2 months ago
Experimental Analysis of BRDF Models
The Bidirectional Reflectance Distribution Function (BRDF) describes the appearance of a material by its interaction with light at a surface point. A variety of analytical models...
Addy Ngan, Frédo Durand, Wojciech Matusik