Sciweavers

3555 search results - page 526 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
PEWASUN
2004
ACM
15 years 9 months ago
A simulation study on multi-rate mobile ad hoc networks
This paper studies the performance of a multi-rate mobile ad hoc network (MANET) using an extended ns-2 simulator. A link adaptation algorithm is developed and tested. The multi-r...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava
155
Voted
VISUALIZATION
1999
IEEE
15 years 8 months ago
Hierarchical Parallel Coordinates for Exploration of Large Datasets
Our ability to accumulate large, complex (multivariate) data sets has far exceeded our ability to effectively process them in search of patterns, anomalies, and other interesting ...
Ying-Huey Fua, Matthew O. Ward, Elke A. Rundenstei...
CC
2006
Springer
129views System Software» more  CC 2006»
15 years 7 months ago
Loop Transformations in the Ahead-of-Time Optimization of Java Bytecode
Abstract. Loop optimizations such as loop unrolling, unfolding and invariant code motion have long been used in a wide variety of compilers to improve the running time of applicati...
Simon Hammond, David Lacey
AAAI
2008
15 years 6 months ago
A Meta-Programming Technique for Debugging Answer-Set Programs
Answer-set programming (ASP) is widely recognised as a viable tool for declarative problem solving. However, there is currently a lack of tools for developing answer-set programs....
Martin Gebser, Jörg Pührer, Torsten Scha...
114
Voted
CHINZ
2005
ACM
15 years 6 months ago
Graphical abstract help
re the use of abstracted screenshots as part of a new help interface. Graphstract, an implementation of a graphical help system, extends the ideas of textually oriented Minimal Ma...
Jeff Huang, Bo Lu, Michael B. Twidale