Sciweavers

1494 search results - page 242 / 299
» Less Extreme Programming
Sort
View
101
Voted
COR
2007
143views more  COR 2007»
15 years 2 months ago
Discrete bandwidth allocation considering fairness and transmission load in multicast networks
As a promising solution to tackle the network heterogeneity in multicasting, layered multicast protocols such as Receiver-driven layered multicast (RLM) and Layered video multicas...
Chae Y. Lee, Hee K. Cho
JCC
2008
132views more  JCC 2008»
15 years 2 months ago
The implementation of a fast and accurate QM/MM potential method in Amber
Abstract: Version 9 of the Amber simulation programs includes a new semi-empirical hybrid QM/MM functionality. This includes support for implicit solvent (generalized Born) and for...
Ross C. Walker, Michael F. Crowley, David A. Case
137
Voted
JMM2
2008
228views more  JMM2 2008»
15 years 2 months ago
Adaptive AC-Coefficient Prediction for Image Compression and Blind Watermarking
In this work, an adaptive image compression algorithm is proposed based on the prediction of AC coefficients in Discrete Cosine Transform (DCT) block during reconstruction of image...
Kilari Veera Swamy, S. Srinivas Kumar
JOT
2006
69views more  JOT 2006»
15 years 2 months ago
Initium RJS: A Macintosh Screensaver in Java, Part 3
We describe how to create a Java-based screensaver for a Macintosh. A screensaver is a program that automatically runs when the computer enters a quiescent state. Screensaver fram...
Douglas A. Lyon, Pawel Krepsztul, Francisco Castel...
LISP
2006
105views more  LISP 2006»
15 years 2 months ago
Call-by-push-value: Decomposing call-by-value and call-by-name
We present the call-by-push-value (CBPV) calculus, which decomposes the typed call-by-value (CBV) and typed call-by-name (CBN) paradigms into fine-grain primitives. On the operatio...
Paul Blain Levy