Sciweavers

2205 search results - page 300 / 441
» Mutation Operators for Specifications
Sort
View
115
Voted
ISCC
2006
IEEE
15 years 9 months ago
Evaluating Filtering Strategies for Decentralized Handover Prediction in the Wireless Internet
The rapid diffusion of heterogeneous forms of wireless connectivity is pushing the tremendous growth of the commercial interest in mobile services, i.e., distributed applications ...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
120
Voted
GRAPHITE
2006
ACM
15 years 9 months ago
Real-time animation of ancient Roman sites
In the presented article we discuss and detail the general methodological approaches, the reconstruction strategies and the techniques that have been employed to achieve the 3D in...
Nadia Magnenat-Thalmann, Alessandro Enrico Foni, N...
131
Voted
SAC
2006
ACM
15 years 9 months ago
J2EE server scalability through EJB replication
With the development of Internet-based business, Web applications are becoming increasingly complex. The J2EE specification aims at enabling the design of such web application ser...
Sylvain Sicard, Noel De Palma, Daniel Hagimont
125
Voted
DATE
2005
IEEE
118views Hardware» more  DATE 2005»
15 years 9 months ago
A Tool and Methodology for AC-Stability Analysis of Continuous-Time Closed-Loop Systems
—Presented are a methodology and a DFII-based tool for AC-stability analysis of a wide variety of closed-loop continuous-time (operational amplifiers and other linear circuits). ...
Momchil Milev, Rod Burt
93
Voted
DSN
2005
IEEE
15 years 9 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...