Sciweavers

18697 search results - page 3705 / 3740
» Systemic Security Management
Sort
View
125
Voted
FASE
2006
Springer
15 years 7 months ago
: Designing a Scalable Build Process
Modern software codebases are frequently large, heterogeneous, and constantly evolving. The languages and tools for software construction, including code builds and configuration m...
Jason Hickey, Aleksey Nogin
GECCO
2006
Springer
210views Optimization» more  GECCO 2006»
15 years 7 months ago
Clustering the heap in multi-threaded applications for improved garbage collection
Garbage collection can be a performance bottleneck in large distributed, multi-threaded applications. Applications may produce millions of objects during their lifetimes and may i...
Myra B. Cohen, Shiu Beng Kooi, Witawas Srisa-an
ICSE
2000
IEEE-ACM
15 years 7 months ago
Little-JIL/Juliette: a process definition language and interpreter
Little-JIL, a language for programming coordination in processes is an executable, high-level language with a formal (yet graphical) syntax and rigorously defined operational seTh...
Aaron G. Cass, Barbara Staudt Lerner, Stanley M. S...
KDD
2000
ACM
101views Data Mining» more  KDD 2000»
15 years 7 months ago
Incremental quantile estimation for massive tracking
Data--call records, internet packet headers, or other transaction records--are coming down a pipe at a ferocious rate, and we need to monitor statistics of the data. There is no r...
Fei Chen, Diane Lambert, José C. Pinheiro
MATA
2000
Springer
137views Communications» more  MATA 2000»
15 years 7 months ago
Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents
Extensive research on mobile agents has been rife with the growing interests in network computing. In this paper, we have discussed a mobile multi-agent-based framework to address ...
Romit Roy Choudhury, Somprakash Bandyopadhyay, Kri...
« Prev « First page 3705 / 3740 Last » Next »