Sciweavers

2826 search results - page 348 / 566
» A resource-based analysis of IT sourcing
Sort
View
SIGCOMM
1993
ACM
15 years 6 months ago
The Synchronization of Periodic Routing Messages
The paper considers a network with many apparently-independent periodic processes and discusses one method by which these processes can inadvertently become synchronized. In parti...
Sally Floyd, Van Jacobson
ICLP
2010
Springer
15 years 5 months ago
Implementation Alternatives for Bottom-Up Evaluation
Abstract. Bottom-up evaluation is a central part of query evaluation / program execution in deductive databases. It is used after a source code optimization like magic sets or SLDm...
Stefan Brass
ACMSE
2004
ACM
15 years 5 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
APWEB
2006
Springer
15 years 5 months ago
Energy Efficient Protocols for Information Dissemination in Wireless Sensor Networks
Abstract. In this paper we consider a distributed and efficient information dissemination and retrieval system for wireless sensor networks. In such a system each sensor node opera...
Dandan Liu, Xiaodong Hu, Xiaohua Jia
EXTREME
2004
ACM
15 years 5 months ago
Interpretation Beyond Markup
The meaning conveyed by documents and their markup often goes well beyond what can be inferred from the markup alone. It often depends on context, so that to interpret document ma...
David Dubin, David J. Birnbaum