Sciweavers

1528 search results - page 83 / 306
» Implementing Generalized Operator Overloading
Sort
View
CAISE
2006
Springer
15 years 6 months ago
Incremental Evaluation of OCL Constraints
: Integrity checking is aimed at determining whether an operation execution violates a given integrity constraint. To perform this computation efficiently, several incremental meth...
Jordi Cabot, Ernest Teniente
PDPTA
2003
15 years 6 months ago
Improving Distributed OS Performance by Flexible Incremental Linking
Abstract Distributed Systems suffer from the enormous performance gap between local and remote operation. To bridge this gap a general purpose distributed operating system must pr...
Markus Pizka
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 5 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
OSDI
2008
ACM
16 years 5 months ago
Block Mason
The flexibility provided by hardware virtualization allows administrators to rapidly create, destroy, and migrate systems across physical hosts. Unfortunately, the storage systems...
Dutch T. Meyer, Brendan Cully, Jake Wires, Norman ...
162
Voted
MDM
2005
Springer
174views Communications» more  MDM 2005»
15 years 10 months ago
GPAC: generic and progressive processing of mobile queries over mobile data
This paper introduces a new family of Generic and Progressive algorithms (GPAC, for short) for continuous mobile queries over mobile objects. GPAC provides a general skeleton that...
Mohamed F. Mokbel, Walid G. Aref