Sciweavers

14078 search results - page 2510 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
MSWIM
2006
ACM
15 years 10 months ago
Testing methodology for an ad hoc routing protocol
In this paper, we define a model of an ad hoc routing protocol, i.e. the OLSR (Optimized Link-State Routing) protocol. This model handles novel constraints related to such networ...
Stéphane Maag, Fatiha Zaïdi
PLDI
2006
ACM
15 years 10 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
SIGMETRICS
2005
ACM
120views Hardware» more  SIGMETRICS 2005»
15 years 10 months ago
Managing server energy and operational costs in hosting centers
The growing cost of tuning and managing computer systems is leading to out-sourcing of commercial services to hosting centers. These centers provision thousands of dense servers w...
Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubram...
MMAS
2004
Springer
15 years 9 months ago
Agent Server Technology for Managing Millions of Agents
d to submit first an abstract (to signal your interest and contribution) and then a full paper (for review) to the workshop. All accepted papers will be published as a volume from ...
Gaku Yamamoto
VRML
2003
ACM
15 years 9 months ago
Early experiences with a 3D model search engine
New acquisition and modeling tools make it easier to create 3D models, and affordable and powerful graphics hardware makes it easier to use them. As a result, the number of 3D mo...
Patrick Min, John A. Halderman, Michael M. Kazhdan...
« Prev « First page 2510 / 2816 Last » Next »