Sciweavers

747 search results - page 118 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
EMSOFT
2009
Springer
14 years 3 months ago
Probabilistic modeling of data cache behavior
In this paper, we propose a formal analysis approach to estimate the expected (average) data cache access time of an application across all possible program inputs. Towards this g...
Vinayak Puranik, Tulika Mitra, Y. N. Srikant
SLE
2009
Springer
14 years 3 months ago
Study of an API Migration for Two XML APIs
Abstract. API migration refers to adapting an application such that its dependence on a given API (the source API) is eliminated in favor of depending on an alternative API (the ta...
Thiago Tonelli Bartolomei, Krzysztof Czarnecki, Ra...
INFOCOM
2006
IEEE
14 years 2 months ago
On the Long-term Evolution of the Two-Tier Gnutella Overlay
— Peer-to-Peer (P2P) file sharing applications have witnessed a dramatic increase in popularity during the past few years. To accommodate the rapid growth in user population, de...
Amir H. Rasti, Daniel Stutzbach, Reza Rejaie
SUTC
2006
IEEE
14 years 2 months ago
Design and Implementation of Ubiquitous Smart Cameras
Design aspects and software modelling for ubiquitous real-time camera system are described in this paper. We propose system architecture using a network of inexpensive cameras and...
Chang Hong Lin, Wayne Wolf, Andrew Dixon, Xenofon ...
DCOSS
2010
Springer
14 years 1 months ago
Programming Sensor Networks Using Remora Component Model
Abstract. The success of high-level programming models in Wireless Sensor Networks (WSNs) is heavily dependent on factors such as ease of programming, code well-structuring, degree...
Amirhosein Taherkordi, Frédéric Loir...