Sciweavers

1091 search results - page 168 / 219
» Pro-active Performance Management of Distributed Application...
Sort
View
108
Voted
ISPAN
2002
IEEE
15 years 5 months ago
On the Impact of Naming Methods for Heap-Oriented Pointers in C Programs
Many applications written in C allocate memory blocks for their major data structures from the heap space at runtime. The analysis of heap-oriented pointers in such programs is cr...
Tong Chen, Jin Lin, Wei-Chung Hsu, Pen-Chung Yew
144
Voted
ECOOPW
1998
Springer
15 years 4 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
108
Voted
DGO
2008
173views Education» more  DGO 2008»
15 years 1 months ago
The Deliberative E-Rulemaking project (DeER): improving federal agency rulemaking via natural language processing and citizen di
Many scholars believe that electronic rulemaking has great but largely untapped potential to expand the public's democratic input and improve federal agency regulatory rules....
Peter Muhlberger, Nick Webb, Jennifer Stromer-Gall...
120
Voted
GRID
2006
Springer
15 years 17 days ago
How are Real Grids Used? The Analysis of Four Grid Traces and Its Implications
The Grid computing vision promises to provide the needed platform for a new and more demanding range of applications. For this promise to become true, a number of hurdles, includin...
Alexandru Iosup, Catalin Dumitrescu, Dick H. J. Ep...
123
Voted
CIKM
2010
Springer
14 years 11 months ago
Understanding retweeting behaviors in social networks
Retweeting is an important action (behavior) on Twitter, indicating the behavior that users re-post microblogs of their friends. While much work has been conducted for mining text...
Zi Yang, Jingyi Guo, Keke Cai, Jie Tang, Juanzi Li...