Sciweavers

1805 search results - page 69 / 361
» Understanding Code Mobility
Sort
View
CPAIOR
2005
Springer
14 years 3 months ago
Formulations and Reformulations in Integer Programming
Creating good integer programming formulations had, as a basic axiom, the rule “Find formulations with tighter linear relaxations”. This rule, while useful when using unsophist...
Michael A. Trick
WCRE
1995
IEEE
14 years 1 months ago
Strongest Postcondition Semantics as the Formal Basis for Reverse Engineering
Reverse engineering of program code is the process of constructing a higher level abstraction of an implementation in order to facilitate the understanding of a system that may be...
Gerald C. Gannod, Betty H. C. Cheng
CCGRID
2007
IEEE
14 years 4 months ago
A Semantic Approach to Enhance Service Composition in Workflows that use Mobile Services
The successful execution of workflows using mobile services is dependant on the services behaving as expected. The management of this behaviour in Akogrimo is achieved by a contex...
Robert B. Piotter, Tom Kirkham, Julian R. Gallop, ...
PERCOM
2010
ACM
13 years 8 months ago
Measuring mobile phone energy consumption for 802.11 wireless networking
The complexity of modern mobile phones makes it difficult for developers to understand the power consumption of their applications. Our measurement framework produces fine-graine...
Andrew Colin Rice, Simon Hay
CORR
2008
Springer
108views Education» more  CORR 2008»
13 years 10 months ago
Restricted Mobility Improves Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks
Abstract-- In this paper, we analyze asymptotic delaythroughput trade-offs in mobile ad-hoc networks comprising heterogeneous nodes with restricted mobility. We show that node spat...
Michele Garetto, Emilio Leonardi