Sciweavers

4498 search results - page 270 / 900
» How to Invent Functions
Sort
View
VL
1998
IEEE
116views Visual Languages» more  VL 1998»
15 years 9 months ago
Programming Web-Based Applications within a Data-Flow VL
This paper shows how a general purpose data flow visual programming environment can be effectively used to find, collect and manipulate information available on the web. The discu...
Roberto Idini, Mauro Mosconi, Marco Porta
WMRD
1990
15 years 8 months ago
Replicated K-Resilient Objects in Arjuna
This paper describes the design of an object replication scheme for the Arjuna distributed system. ThedesignsupportsK-resiliency,where,intheabsenceofnetworkpartitions,Koutofa tota...
Mark C. Little, Santosh K. Shrivastava
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 8 months ago
Optimal Pricing for Selfish Users and Prefetching in Heterogeneous Wireless Networks
Prefetching has been shown to be an effective technique for reducing resource cost and delay in heterogeneous wireless networks. However, in modern wireless local area networks, th...
Jonathan Y. Lau, Ben Liang
ACMSE
2004
ACM
15 years 8 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
ERCIMDL
2004
Springer
143views Education» more  ERCIMDL 2004»
15 years 8 months ago
Dynamic Digital Library Construction and Configuration
Abstract. This paper describes a digital library architecture and implementation that is configurable, extensible and dynamic in the way it presents content and in the services it ...
David Bainbridge, Katherine J. Don, George Buchana...