Sciweavers

1843 search results - page 279 / 369
» Securing Class Initialization
Sort
View
ESA
2003
Springer
98views Algorithms» more  ESA 2003»
14 years 3 months ago
Network Lifetime and Power Assignment in ad hoc Wireless Networks
In ad-hoc wireless networks, certain network connectivity constraints are of interest because of their practical importance. An example of such a constraint would be strong connec...
Gruia Calinescu, Sanjiv Kapoor, Alexander Olshevsk...
GECCO
2003
Springer
103views Optimization» more  GECCO 2003»
14 years 3 months ago
Multicriteria Network Design Using Evolutionary Algorithm
In this paper, we revisit a general class of multi-criteria multi-constrained network design problems and attempt to solve, in a novel way, with Evolutionary Algorithms (EAs). A ma...
Rajeev Kumar, Nilanjan Banerjee
SIGMOD
2010
ACM
273views Database» more  SIGMOD 2010»
14 years 2 months ago
Google fusion tables: web-centered data management and collaboration
It has long been observed that database management systems focus on traditional business applications, and that few people use a database management system outside their workplace...
Hector Gonzalez, Alon Y. Halevy, Christian S. Jens...
ICSE
2010
IEEE-ACM
14 years 2 months ago
Dynamic symbolic data structure repair
Generic repair of complex data structures is a new and exciting area of research. Existing approaches can integrate with good software engineering practices such as program assert...
Ishtiaque Hussain, Christoph Csallner
CDC
2009
IEEE
127views Control Systems» more  CDC 2009»
14 years 2 months ago
Dirichlet problems for some Hamilton-Jacobi equations with inequality constraints
We use viability techniques for solving Dirichlet problems with inequality constraints (obstacles) for a class of Hamilton-Jacobi equations. The hypograph of the “solution” is ...
Jean-Pierre Aubin, Alexandre M. Bayen, Patrick Sai...