Sciweavers

1516 search results - page 183 / 304
» Generalizing Indexical-Functional Reference
Sort
View
LCTRTS
2005
Springer
15 years 3 months ago
A dictionary construction technique for code compression systems with echo instructions
Dictionary compression mechanisms identify redundant sequences of instructions that occur in a program. The sequences are extracted and copied to a dictionary. Each sequence is th...
Philip Brisk, Jamie Macbeth, Ani Nahapetian, Majid...
MSN
2005
Springer
15 years 3 months ago
Dual Binding Update with Additional Care of Address in Network Mobility
In this paper, we propose an end-to-end route optimization scheme for nested mobile networks, which we refer to as Dual Binding Update (DBU ). In general, the nested mobile network...
Kwang Chul Jeong, Tae-Jin Lee, Hyunseung Choo
OOPSLA
2005
Springer
15 years 3 months ago
Fortune teller: improving garbage collection performance in server environment using live objects prediction
Currently, the most adopted criterion to invoke garbage collection is heap space exhaustion. In other words, garbage collection is invoked when the heap space (either the entire s...
Feng Xian, Witawas Srisa-an, Hong Jiang
SPC
2005
Springer
15 years 3 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
ATAL
2005
Springer
15 years 3 months ago
AmbieAgents: a scalable infrastructure for mobile and context-aware information services
Context-aware information systems for mobile users have to cope with a variety of requirements in order to be able to provide an added value that goes beyond simply location-based...
Till Christopher Lech, Leendert W. M. Wienhofen