Sciweavers

2517 search results - page 474 / 504
» Specifying Weak Sets
Sort
View
WORDS
2005
IEEE
14 years 29 days ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...
AOSD
2005
ACM
14 years 29 days ago
Adaptive programming in JAsCo
In this paper we propose an extension to JAsCo for supporting Adaptive Programming in a Component-Based Software Development context. JAsCo is an aspect-oriented programming langu...
Wim Vanderperren, Davy Suvée, Bart Verheeck...
ITICSE
2005
ACM
14 years 29 days ago
Teaching programming and language concepts using LEGOs
concepts more concrete. The method has two main learning outcomes: • Language Specification – The goal of the assignment is to be able to build LEGO® creations on a standard g...
Cynthia S. Hood, Dennis J. Hood
SIGECOM
2005
ACM
117views ECommerce» more  SIGECOM 2005»
14 years 29 days ago
First-price path auctions
We study first-price auction mechanisms for auctioning flow between given nodes in a graph. A first-price auction is any auction in which links on winning paths are paid their ...
Nicole Immorlica, David R. Karger, Evdokia Nikolov...
BTW
2005
Springer
142views Database» more  BTW 2005»
14 years 28 days ago
Self-Extending Peer Data Management
Abstract: Peer data management systems (PDMS) are the natural extension of integrated information systems. Conventionally, a single integrating system manages an integrated schema,...
Ralf Heese, Sven Herschel, Felix Naumann, Armin Ro...