Sciweavers

4642 search results - page 429 / 929
» Distributed algorithm and reversible network
Sort
View
SAC
2009
ACM
15 years 11 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
144
Voted
LCN
2005
IEEE
15 years 10 months ago
Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler
— A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA...
Paal Engelstad, Olav N. Østerbø
ICSE
2010
IEEE-ACM
15 years 7 months ago
Supporting developers with natural language queries
The feature list of modern IDEs is steadily growing and mastering these tools becomes more and more demanding, especially for novice programmers. Despite their remarkable capabili...
Michael Würsch, Giacomo Ghezzi, Gerald Reif, ...
BMCBI
2010
135views more  BMCBI 2010»
15 years 5 months ago
Delineation of amplification, hybridization and location effects in microarray data yields better-quality normalization
Background: Oligonucleotide arrays have become one of the most widely used high-throughput tools in biology. Due to their sensitivity to experimental conditions, normalization is ...
Marc Hulsman, Anouk Mentink, Eugene P. van Someren...
122
Voted
SAC
2008
ACM
15 years 4 months ago
Fast self-healing gradients
We present CRF-Gradient, a self-healing gradient algorithm that provably reconfigures in O(diameter) time. Selfhealing gradients are a frequently used building block for distribut...
Jacob Beal, Jonathan Bachrach, Daniel Vickery, Mar...