Sciweavers

848 search results - page 160 / 170
» Understanding Obfuscated Code
Sort
View
IFIP
1994
Springer
13 years 11 months ago
Investigating the use of interactive hypermedia systems
There have been innumerable glowing reports of the way hypermedia systems allow users to explore and use vast amounts of information in ways not possible using traditional informa...
Peter Evans II
AGTIVE
2007
Springer
13 years 11 months ago
Transforming Timeline Specifications into Automata for Runtime Monitoring
Abstract. In runtime monitoring, a programmer specifies code to execute whenever a sequence of events occurs during program execution. Previous and related work has shown that runt...
Eric Bodden, Hans Vangheluwe
CIKM
2009
Springer
13 years 11 months ago
Generating SQL/XML query and update statements
The XML support in relational databases and the SQL/XML language are still relatively new as compared to purely relational databases and traditional SQL. Today, most database user...
Matthias Nicola, Tim Kiefer
ICDCS
2010
IEEE
13 years 11 months ago
On the Impact of MIMO Diversity on Higher Layer Performance
Abstract—In this paper, we shed light on the cross-layer interactions between the PHY, link and routing layers in networks with MIMO links operating in the diversity mode. Many p...
Ece Gelal, Konstantinos Pelechrinis, Ioannis Brous...
CF
2006
ACM
13 years 11 months ago
Performance characteristics of an adaptive mesh refinement calculation on scalar and vector platforms
Adaptive mesh refinement (AMR) is a powerful technique that reduces the resources necessary to solve otherwise intractable problems in computational science. The AMR strategy solv...
Michael L. Welcome, Charles A. Rendleman, Leonid O...