Sciweavers

8109 search results - page 1301 / 1622
» A Model of Component-Based Programming
Sort
View
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 11 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
HICSS
2009
IEEE
112views Biometrics» more  HICSS 2009»
15 years 11 months ago
Optimal Pumping Schedule and Salinity Control in a Coastal Aquifer: a Decision Support System
Proper management of coastal wells is important in order to satisfy demand, minimize costs, control salinity increase, and ultimately to define water resource strategies which are...
T. Ka'eo Duarte, Riccardo Minciardi, Michela Robba...
AOSD
2009
ACM
15 years 11 months ago
Expressive scoping of distributed aspects
Dynamic deployment of aspects brings greater flexibility and reuse potential, but requires proper means for scoping aspects. Scoping issues are particularly crucial in a distribu...
Éric Tanter, Johan Fabry, Rémi Douen...
EDBT
2009
ACM
133views Database» more  EDBT 2009»
15 years 11 months ago
Multiplicative synopses for relative-error metrics
Existing hierarchical summarization techniques fail to provide synopses good in terms of relative-error metrics. This paper introduces multiplicative synopses: a summarization par...
Panagiotis Karras
ICALP
2009
Springer
15 years 11 months ago
Quasirandom Rumor Spreading: Expanders, Push vs. Pull, and Robustness
Abstract Randomized rumor spreading is an efficient protocol to distribute information in networks. Recently, a quasirandom version has been proposed and proven to work equally we...
Benjamin Doerr, Tobias Friedrich, Thomas Sauerwald
« Prev « First page 1301 / 1622 Last » Next »