Sciweavers

CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 7 months ago
Automatic derivation of domain terms and concept location based on the analysis of the identifiers
Abstract. Developers express the meaning of the domain ideas in specifically selected identifiers and comments that form the target implemented code. Software maintenance requires ...
Peter Václavík, Jaroslav Porubä...
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 7 months ago
Using Coloured Petri Nets for design of parallel raytracing environment
Abstract. This paper deals with the parallel raytracing part of virtualreality system PROLAND, developed at the home institution of authors. It describes an actual implementation o...
Stefan Korecko, Branislav Sobota
CORR
2010
Springer
71views Education» more  CORR 2010»
13 years 7 months ago
Start-phase control of distributed systems written in Erlang/OTP
This paper presents a realization for the reliable and fast startup of distributed systems written in Erlang. The traditional startup provided by the Erlang/OTP library is sequenti...
Peter Burcsi, Attila Kovács, Antal Tá...
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 7 months ago
Coding objects related to Catalan numbers
A coding method using binary sequences is presented for different computation problems related to Catalan numbers. This method proves in a very easy way the equivalence of these pr...
Antal Bege, Zoltán Kása
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 7 months ago
On the Design of Efficient CSMA Algorithms for Wireless Networks
Recently, it has been shown that CSMA algorithms which use queue length-based link weights can achieve throughput optimality in wireless networks. In particular, a key result by Ra...
Javad Ghaderi, R. Srikant
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 7 months ago
FIFO anomaly is unbounded
Abstract. Virtual memory of computers is usually implemented by demand paging. For some page replacement algorithms the number of page faults may increase as the number of page fra...
Peter Fornai, Antal Iványi
CORR
2010
Springer
41views Education» more  CORR 2010»
13 years 7 months ago
Cleaning Interval Graphs
Dániel Marx, Ildikó Schlotter
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 7 months ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 7 months ago
Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images
We propose a hybrid technique for image encryption which employs the concept of carrier image and SCAN patterns generated by SCAN methodology. Although it involves existing method ...
Panduranga H. T, Naveen Kumar S. K