Sciweavers

2847 search results - page 397 / 570
» Dynamic Distribution of Java Applications
Sort
View
132
Voted
SAGT
2010
Springer
175views Game Theory» more  SAGT 2010»
15 years 1 months ago
On Learning Algorithms for Nash Equilibria
Can learning algorithms find a Nash equilibrium? This is a natural question for several reasons. Learning algorithms resemble the behavior of players in many naturally arising gam...
Constantinos Daskalakis, Rafael Frongillo, Christo...
HPCA
2005
IEEE
16 years 3 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ICPADS
2006
IEEE
15 years 9 months ago
On the Effects of Consistency in Data Operations in Wireless Sensor Networks
In battery powered systems such as wireless sensor networks, energy efficiency is one of the most important system design goals. In this paper, energy efficiency is examined fro...
Kewei Sha, Weisong Shi
IFIP
2007
Springer
15 years 9 months ago
Towards a Context Binding Transparency
Context-aware applications use context information, like location or identification of nearby objects of interest, to adapt their behavior to the current situation of the user. The...
Tom Broens, Dick A. C. Quartel, Marten van Sindere...
123
Voted
MIDDLEWARE
2004
Springer
15 years 8 months ago
Interoperability Among Independently Evolving Web Services
The increasing popularity of XML Web services motivates us to examine if it is feasible to substitute one vendor service for another when using a Web-based application, assuming th...
Shankar Ponnekanti, Armando Fox