Sciweavers

1340 search results - page 249 / 268
» Structure learning of Bayesian networks using constraints
Sort
View
POPL
1998
ACM
13 years 11 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
MTA
2006
115views more  MTA 2006»
13 years 6 months ago
Tree-assisted gossiping for overlay video distribution
Given its readily deployable nature and broad applications for digital entertainment, video streaming through overlay networks has received much attention recently. While a tree to...
Jiangchuan Liu, Ming Zhou
EUROPAR
2003
Springer
13 years 12 months ago
Support for Personal and Service Mobility in Ubiquitous Computing Environments
This paper describes an agent-based architecture that extends personal mobility to ubiquitous environment. A software agent, running on a portable device, leverages the existing se...
Khalil El-Khatib, N. Hadibi, Gregor von Bochmann
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
13 years 10 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
DEXA
2004
Springer
159views Database» more  DEXA 2004»
13 years 10 months ago
Adaptive Double Routing Indices: Combining Effectiveness and Efficiency in P2P Systems
Unstructured peer-to-peer systems rely on strategies and data structures (Routing Indices) for the routing of requests in the network. For those requests corresponding to informati...
Stéphane Bressan, Achmad Nizar Hidayanto, C...