Sciweavers

11488 search results - page 2019 / 2298
» Robust optimization - methodology and applications
Sort
View
ICOIN
2001
Springer
15 years 8 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
ICS
2001
Tsinghua U.
15 years 8 months ago
Tools for application-oriented performance tuning
Application performance tuning is a complex process that requires assembling various types of information and correlating it with source code to pinpoint the causes of performance...
John M. Mellor-Crummey, Robert J. Fowler, David B....
125
Voted
ICSE
2001
IEEE-ACM
15 years 8 months ago
Applying WinWin to Quality Requirements: A Case Study
This paper describes the application of the WinWin paradigm to identify and resolve conflicts in a series of real-client, student-developer digital library projects. The paper is ...
Hoh In, Barry W. Boehm, Thomas Lee Rodgers, Michae...
OOPSLA
2001
Springer
15 years 8 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
WAA
2001
Springer
15 years 8 months ago
Skewness of Gabor Wavelets and Source Signal Separation
Responses of Gabor wavelets in the mid-frequency space build a local spectral representation scheme with optimal properties regarding the time-frequency uncertainty principle. How...
Weichuan Yu, Gerald Sommer, Konstantinos Daniilidi...
« Prev « First page 2019 / 2298 Last » Next »