Sciweavers

2477 search results - page 385 / 496
» Parallelizing Functional Programs by Generalization
Sort
View
WCRE
2005
IEEE
15 years 8 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
SAC
2005
ACM
15 years 8 months ago
Formal modeling and quantitative analysis of KLAIM-based mobile systems
KLAIM is an experimental language designed for modeling and programming distributed systems composed of mobile components where distribution awareness and dynamic system architect...
Rocco De Nicola, Diego Latella, Mieke Massink
GECCO
2005
Springer
15 years 8 months ago
Evaluating GP schema in context
We propose a new methodology to look at the fitness contributions (semantics) of different schemata in Genetic Programming (GP). We hypothesize that the significance of a schem...
Hammad Majeed, Conor Ryan, R. Muhammad Atif Azad
NETGAMES
2004
ACM
15 years 7 months ago
Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games
Today’s Multi-player Online Games (MOGs) are challenged by infrastructure requirements, because of their server-centric nature. Peer-to-peer networks are an interesting alternat...
Takuji Iimura, Hiroaki Hazeyama, Youki Kadobayashi
DOCENG
2003
ACM
15 years 7 months ago
Set-at-a-time access to XML through DOM
To support the rapid growth of the web and e-commerce, W3C developed DOM as an application programming interface that the abstract, logical tree structure of an XML document. In t...
Hai Chen, Frank Wm. Tompa