Sciweavers

1951 search results - page 45 / 391
» Decoupling Change from Design
Sort
View
109
Voted
DEBS
2003
ACM
15 years 8 months ago
A peer-to-peer approach to content-based publish/subscribe
Publish/subscribe systems are successfully used to decouple distributed applications. However, their efficiency is closely tied to the topology of the underlying network, the desi...
Wesley W. Terpstra, Stefan Behnel, Ludger Fiege, A...
128
Voted
WCRE
1999
IEEE
15 years 7 months ago
Partial Redesign of Java Software Systems Based on Clone Analysis
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
117
Voted
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
15 years 5 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
119
Voted
BMCBI
2010
112views more  BMCBI 2010»
15 years 3 months ago
A boundary delimitation algorithm to approximate cell soma volumes of bipolar cells from topographical data obtained by scanning
Background: Cell volume determination plays a pivotal role in the investigation of the biophysical mechanisms underlying various cellular processes. Whereas light microscopy in pr...
Patrick Happel, Kerstin Moller, Ralf Kunz, Irmgard...
130
Voted
ISCA
1999
IEEE
88views Hardware» more  ISCA 1999»
15 years 7 months ago
A Scalable Front-End Architecture for Fast Instruction Delivery
In the pursuit of instruction-level parallelism, significant demands are placed on a processor's instruction delivery mechanism. Delivering the performance necessary to meet ...
Glenn Reinman, Todd M. Austin, Brad Calder