Sciweavers

158 search results - page 29 / 32
» Requirement Analysis Evolution through Patterns
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
— Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing ...
Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Hei...
JOT
2008
228views more  JOT 2008»
13 years 7 months ago
Adapting the User Interface of Integrated Development Environments (IDEs) for Novice Users
The usability of a user interface is often neglected in the design and development of software applications. An Integrated Development Environment (IDE) is prone to poor usability...
Ying Zou, Michael Lerner, Alex Leung, Scott Moriss...
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
14 years 1 months ago
Virtually Pipelined Network Memory
We introduce virtually-pipelined memory, an architectural technique that efficiently supports high-bandwidth, uniform latency memory accesses, and high-confidence throughput eve...
Banit Agrawal, Timothy Sherwood
GECCO
2008
Springer
107views Optimization» more  GECCO 2008»
13 years 9 months ago
The influence of scaling and assortativity on takeover times in scale-free topologies
In evolving systems, the topological characteristics of population structure have a pronounced impact on the rate of spread of advantageous alleles, and therefore affect selective...
Joshua L. Payne, Margaret J. Eppstein
WIOPT
2010
IEEE
13 years 6 months ago
Performance tuning of Infrastructure-Mode wireless LANs
—Conventional wisdom about 802.11 WLANs dictates that as the number of active users increases, the contention windows (CW) of all the contending users needs to increase to preven...
Yigal Bejerano, Hyoung-Gyu Choi, Seung-Jae Han, Th...