Sciweavers

11231 search results - page 1931 / 2247
» Digging for Data Structures
Sort
View
133
Voted
NETGAMES
2004
ACM
15 years 9 months ago
OpenPING: a reflective middleware for the construction of adaptive networked game applications
The emergence of distributed Virtual Reality (VR) applications that run over the Internet has presented networked game application designers with new challenges. In an environment...
Paul Okanda, Gordon S. Blair
110
Voted
NSPW
2004
ACM
15 years 9 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
15 years 9 months ago
Performance analysis of BSTs in system software
Binary search tree (BST) based data structures, such as AVL trees, red-black trees, and splay trees, are often used in system software, such as operating system kernels. Choosing ...
Ben Pfaff
132
Voted
SIGOPSE
2004
ACM
15 years 9 months ago
Generic role assignment for wireless sensor networks
Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network appl...
Kay Römer, Christian Frank, Pedro José...
122
Voted
SIGSOFT
2004
ACM
15 years 9 months ago
Using an SQL coverage measurement for testing database applications
Many software applications have a component based on database management systems in which information is generally handled through SQL queries embedded in the application code. Wh...
María José Suárez Cabal, Javi...
« Prev « First page 1931 / 2247 Last » Next »