Sciweavers

8493 search results - page 1604 / 1699
» Implementing a distributed firewall
Sort
View
170
Voted
VEE
2005
ACM
199views Virtualization» more  VEE 2005»
15 years 9 months ago
Escape analysis in the context of dynamic compilation and deoptimization
In object-oriented programming languages, an object is said to escape the method or thread in which it was created if it can also be accessed by other methods or threads. Knowing ...
Thomas Kotzmann, Hanspeter Mössenböck
139
Voted
VRST
2005
ACM
15 years 9 months ago
Artistic reality: fast brush stroke stylization for augmented reality
The goal of augmented reality is to provide the user with a view of the surroundings enriched by virtual objects. Practically all augmented reality systems rely on standard realti...
Jan Fischer, Dirk Bartz, Wolfgang Straßer
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach
Service discovery in mobile ad hoc networks is challenging because of the absence of any central intelligence in the network. Traditional solutions as used in the Internet are hen...
Vincent Lenders, Martin May, Bernhard Plattner
AADEBUG
2005
Springer
15 years 9 months ago
Code coverage testing using hardware performance monitoring support
Code coverage analysis, the process of finding code exercised by a particular set of test inputs, is an important component of software development and verification. Most tradit...
Alex Shye, Matthew Iyer, Vijay Janapa Reddi, Danie...
136
Voted
CAISE
2005
Springer
15 years 9 months ago
Dynamic Load Balancing of Virtualized Database Services Using Hints and Load Forecasting
Abstract. Future database application systems will be designed as Service Oriented Architectures (SOAs), in contrast to today’s monolithic architectures. The decomposition in man...
Daniel Gmach, Stefan Krompass, Stefan Seltzsam, Ma...
« Prev « First page 1604 / 1699 Last » Next »