Sciweavers

1135 search results - page 176 / 227
» On Performance of Delegation in Java
Sort
View
128
Voted
WCE
2007
15 years 5 months ago
Modelling BLUE Active Queue Management using Discrete-time Queue
—This paper proposes a new discrete-time queue analytical model based on BLUE algorithm in order to determine the network congestion in preliminary stages. We compare the origina...
Hussein Abdel-jaber, Michael E. Woodward, Fadi A. ...
ICFP
2010
ACM
15 years 5 months ago
Scrapping your inefficient engine: using partial evaluation to improve domain-specific language implementation
Partial evaluation aims to improve the efficiency of a program by specialising it with respect to some known inputs. In this paper, we show that partial evaluation can be an effec...
Edwin Brady, Kevin Hammond
BMCBI
2008
99views more  BMCBI 2008»
15 years 4 months ago
NestedMICA as an ab initio protein motif discovery tool
Background: Discovering overrepresented patterns in amino acid sequences is an important step in protein functional element identification. We adapted and extended NestedMICA, an ...
Mutlu Dogruel, Thomas A. Down, Tim J. P. Hubbard
COMPSEC
2008
138views more  COMPSEC 2008»
15 years 4 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
140
Voted
DPD
2006
123views more  DPD 2006»
15 years 4 months ago
Reducing network traffic in unstructured P2P systems using Top-k queries
A major problem of unstructured P2P systems is their heavy network traffic. This is caused mainly by high numbers of query answers, many of which are irrelevant for users. One solu...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez