Sciweavers

799 search results - page 127 / 160
» Refinement and Separation Contexts
Sort
View
CSMR
2000
IEEE
15 years 8 months ago
Experiences Reverse Engineering Manually
Better understanding manual reverse engineering can make it and any associated systems reengineering more effective. We reverse engineered a version of a system (referred to as &q...
Dave Swafford, Diana Elman, Peter Aiken, Jeff Merh...
146
Voted
ITCC
2000
IEEE
15 years 8 months ago
Towards Knowledge Discovery from WWW Log Data
As the result of interactions between visitors and a web site, an http log file contains very rich knowledge about users on-site behaviors, which, if fully exploited, can better c...
Feng Tao, Fionn Murtagh
120
Voted
SIGSOFT
2000
ACM
15 years 8 months ago
Extracting library-based object-oriented applications
In an increasingly popular model of software distribution, software is developed in one computing environment and deployed in other environments by transfer over the internet. Ext...
Peter F. Sweeney, Frank Tip
131
Voted
INFOCOM
1998
IEEE
15 years 7 months ago
A Priority Scheme for the IEEE 802.14 MAC Protocol for Hybrid Fiber-Coax Networks
In order to support quality-of-service (QoS) for real-time data communications such as voice, video and interactive services, multiaccess networks must provide an effective priorit...
Mark D. Corner, Nada Golmie, Jörg Liebeherr, ...
MABS
1998
Springer
15 years 7 months ago
ABCDE: Agent Based Chaotic Dynamic Emergence
This paper concerns agent based experiments in the field of negotiation and exchange simulation. A computer simulation environment is built, showing the emergence of chaotic price ...
Pietro Terna