Sciweavers

5550 search results - page 1081 / 1110
» Different Approaches to Proof Systems
Sort
View
NDSS
2009
IEEE
15 years 4 months ago
Detecting Forged TCP Reset Packets
Several off-the-shelf products enable network operators to enforce usage restrictions by actively terminating connections when deemed undesirable. While the spectrum of their appl...
Nicholas Weaver, Robin Sommer, Vern Paxson
IPPS
2009
IEEE
15 years 4 months ago
Annotation-based empirical performance tuning using Orio
In many scientific applications, significant time is spent tuning codes for a particular highperformance architecture. Tuning approaches range from the relatively nonintrusive (...
Albert Hartono, Boyana Norris, Ponnuswamy Sadayapp...
AGS
2009
Springer
15 years 4 months ago
Intelligent Agent Modeling as Serious Game
We propose a novel approach to intelligent tutoring gaming simulations designed for both educational and inquiry purposes in complex multi-actor systems such as infrastructures or...
D. W. F. van Krevelen
CIKM
2009
Springer
15 years 4 months ago
Evaluating top-k queries over incomplete data streams
We study the problem of continuous monitoring of top-k queries over multiple non-synchronized streams. Assuming a sliding window model, this general problem has been a well addres...
Parisa Haghani, Sebastian Michel, Karl Aberer
OOPSLA
2009
Springer
15 years 4 months ago
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
An object diagram makes explicit the object structures that are only implicit in a class diagram. An object diagram may be missing and must extracted from the code. Alternatively,...
Marwan Abi-Antoun, Jonathan Aldrich
« Prev « First page 1081 / 1110 Last » Next »