Sciweavers

3031 search results - page 523 / 607
» Reuse in the application layer
Sort
View
IAAI
2003
13 years 11 months ago
Secure Mobile Agents on Ad Hoc Wireless Networks
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wirel...
Evan Sultanik, Donovan Artz, Gustave Anderson, Mos...
PDPTA
2004
13 years 11 months ago
Achieving Flow Level QoS in Cut-Through Networks Through Admission Control and DiffServ
Cluster networks will serve as the future access networks for multimedia streaming, massive multiplayer online gaming, e-commerce, network storage etc. And for those application ar...
Frank Olaf Sem-Jacobsen, Sven-Arne Reinemo, Tor Sk...
NDDL
2003
13 years 11 months ago
High-Level Data Races
Data races are a common problem in concurrent and multi-threaded programming. They are hard to detect without proper tool support. Despite the successful application of these tools...
Cyrille Artho, Klaus Havelund, Armin Biere
VISSYM
2003
13 years 11 months ago
Hardware-assisted View-dependent Isosurface Extraction using Spherical Partition
Extracting only the visible portion of an isosurface can improve both the computation efficiency and the rendering speed. However, the visibility test overhead can be quite high ...
Jinzhu Gao, Han-Wei Shen
IPCO
1992
112views Optimization» more  IPCO 1992»
13 years 11 months ago
The Metric Polytope
In this paper we study enumeration problems for polytopes arising from combinatorial optimization problems. While these polytopes turn out to be quickly intractable for enumeration...
Monique Laurent, Svatopluk Poljak