Sciweavers

10715 search results - page 2035 / 2143
» Proofs from Tests
Sort
View
MMMACNS
2005
Springer
14 years 1 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
OOPSLA
2005
Springer
14 years 1 months ago
Relational queries over program traces
Instrumenting programs with code to monitor runtime behavior is a common technique for profiling and debugging. In practice, instrumentation is either inserted manually by progra...
Simon Goldsmith, Robert O'Callahan, Alexander Aike...
OOPSLA
2005
Springer
14 years 1 months ago
Parametric polymorphism for software component architectures
Parametric polymorphism has become a common feature of mainstream programming languages, but software component architectures have lagged behind and do not support it. We examine ...
Cosmin E. Oancea, Stephen M. Watt
WIRN
2005
Springer
14 years 1 months ago
Artificial Immune-Based Optimization Technique for Solving Economic Dispatch in Power System
Abstract. This paper presents an Artificial Immune-based optimization technique for solving the economic dispatch problem in a power system. The main role of electrical power utili...
Titik Khawa Abdul Rahman, Saiful Izwan Suliman, Is...
ACMACE
2004
ACM
14 years 1 months ago
AR-bowling: immersive and realistic game play in real environments using augmented reality
The game and entertainment industry plays an enormous role within the development and extensive usage of new technologies. They are one major technology driver concerning the deve...
Carsten Matysczok, Rafael Radkowski, Jan Berssenbr...
« Prev « First page 2035 / 2143 Last » Next »