Sciweavers

10038 search results - page 1918 / 2008
» Model Checking for Managers
Sort
View
ESA
2006
Springer
140views Algorithms» more  ESA 2006»
15 years 4 months ago
Latency Constrained Aggregation in Sensor Networks
A sensor network consists of sensing devices which may exchange data through wireless communication. A particular feature of sensor networks is that they are highly energy constrai...
Luca Becchetti, Peter Korteweg, Alberto Marchetti-...
89
Voted
GECCO
2006
Springer
186views Optimization» more  GECCO 2006»
15 years 4 months ago
Genetic programming for agricultural purposes
Nitrogen is one of the most important chemical intakes to ensure the healthy growth of agricultural crops. However, some environmental concerns emerge (soil and water pollution) w...
Clément Chion, Luis E. Da Costa, Jacques-An...
119
Voted
SIGUCCS
2000
ACM
15 years 4 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
95
Voted
USENIX
2007
15 years 3 months ago
MapJAX: Data Structure Abstractions for Asynchronous Web Applications
Data Structure Abstractions for Asynchronous Web Applications Daniel S. Myers MIT CSAIL Jennifer N. Carlisle MIT CSAIL James A. Cowling MIT CSAIL Barbara H. Liskov MIT CSAIL The c...
Daniel S. Myers, Jennifer N. Carlisle, James A. Co...
USS
2008
15 years 3 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
« Prev « First page 1918 / 2008 Last » Next »