Sciweavers

7380 search results - page 1378 / 1476
» Engineering Software Intensive Systems
Sort
View
SECON
2007
IEEE
15 years 4 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
PLDI
2003
ACM
15 years 3 months ago
Ownership types for safe region-based memory management in real-time Java
The Real-Time Specification for Java (RTSJ) allows a program to create real-time threads with hard real-time constraints. Real-time threads use region-based memory management to ...
Chandrasekhar Boyapati, Alexandru Salcianu, Willia...
CLEF
2005
Springer
15 years 3 months ago
Dictionary-Based Amharic-French Information Retrieval
We present four approaches to the Amharic - French bilingual track at CLEF 2005. All experiments use a dictionary based approach to translate the Amharic queries into French Bags-...
Atelach Alemu Argaw, Lars Asker, Rickard Cöst...
IADIS
2004
14 years 11 months ago
Solving Crossword Puzzles via the Google API
The GoogleTM API enables software agents to query and use search results from the large collections of data available via the ever-popular Google search engine. Web searches using...
David E. Goldschmidt, Mukkai S. Krishnamoorthy
WSC
1997
14 years 11 months ago
Java Based Conservative Distributed Simulation
Distributed discrete event simulation techniques aim at an acceleration of the execution of a self-contained simulation model by the spatial decomposition of that model and the co...
Alois Ferscha, Michael Richter
« Prev « First page 1378 / 1476 Last » Next »