Sciweavers

1465 search results - page 276 / 293
» Making the Correct Mistakes
Sort
View
CCR
2007
119views more  CCR 2007»
14 years 9 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
93
Voted
INTERNET
2008
150views more  INTERNET 2008»
14 years 9 months ago
RPC and REST: Dilemma, Disruption, and Displacement
straction and explained how the Representational State Transfer (REST) architectural style is one alternative that can yield a superior approach to building distributed systems. Be...
Steve Vinoski
JCB
2006
129views more  JCB 2006»
14 years 9 months ago
GenRate: A Generative Model that Reveals Novel Transcripts in Genome-Tiling Microarray Data
Genome-wide microarray designs containing millions to hundreds of millions of probes are available for a variety of mammals, including mouse and human. These genome tiling arrays ...
Brendan J. Frey, Quaid Morris, Timothy R. Hughes
JUCS
2008
186views more  JUCS 2008»
14 years 9 months ago
A Safe Dynamic Adaptation Framework for Aspect-Oriented Software Development
: One focus of current software development is the re-use of components in the construction of systems. Software Adaptation facilitates the consequent need to adapt these component...
Miguel Ángel Pérez Toledano, Amparo ...
70
Voted
ECCC
2007
115views more  ECCC 2007»
14 years 9 months ago
A (De)constructive Approach to Program Checking
Program checking, program self-correcting and program selftesting were pioneered by [Blum and Kannan] and [Blum, Luby and Rubinfeld] in the mid eighties as a new way to gain conï¬...
Shafi Goldwasser, Dan Gutfreund, Alexander Healy, ...