Sciweavers

5343 search results - page 338 / 1069
» Keyword programming in java
Sort
View
142
Voted
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
15 years 7 months ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
126
Voted
GECCO
2006
Springer
253views Optimization» more  GECCO 2006»
15 years 7 months ago
A novel approach to optimize clone refactoring activity
Achieving a high quality and cost-effective tests is a major concern for software buyers and sellers. Using tools and integrating techniques to carry out low cost testing are chal...
Salah Bouktif, Giuliano Antoniol, Ettore Merlo, Ma...
144
Voted
ECIS
2000
15 years 5 months ago
Secure Access to Medical Data over the Internet
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
Ulrich Ultes-Nitsche, Stephanie Teufel
118
Voted
CORR
2008
Springer
105views Education» more  CORR 2008»
15 years 3 months ago
Integrating OPC Data into GSN Infrastructures
This paper presents the design and the implementation of an interface software component between OLE for Process Control (OPC) formatted data and the Global ...
Olivier Passalacqua, Eric Benoit, Marc-Philippe Hu...
106
Voted
MTA
2007
70views more  MTA 2007»
15 years 3 months ago
Tools for transparent synchronous collaborative environments
Synchronous collaborative environments can provide an identical visual and operable working area among geographically separated participants. There are two basic approaches for pro...
Abdulmotaleb El-Saddik, Dongsheng Yang, Nicolas D....