Sciweavers

4759 search results - page 918 / 952
» Software Development Based on Software Pattern Evolution
Sort
View
ICDM
2006
IEEE
76views Data Mining» more  ICDM 2006»
15 years 8 months ago
How Bayesians Debug
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault l...
Chao Liu 0001, Zeng Lian, Jiawei Han
CONEXT
2006
ACM
15 years 8 months ago
Modeling ping times in first person shooter games
In First Person Shooter (FPS) games the Round Trip Time (RTT), i.e., the sum of the network delay from client to server and the network delay from server to client, impacts the ga...
Natalie Degrande, Danny De Vleeschauwer, Robert E....
149
Voted
W4A
2005
ACM
15 years 7 months ago
Designing learning systems to provide accessible services
The need for providing learners with web-based learning content that match their accessibility needs and preferences, as well as providing ways to match learning content to userâ€...
Pythagoras Karampiperis, Demetrios G. Sampson
MIDDLEWARE
2005
Springer
15 years 7 months ago
Improving flexibility on host discovery for pervasive computing middlewares
The vision of pervasive or ubiquitous computing, conceived by Mark Weiser, foresees a world where computing is embedded in every day objects. Such objects interact with each other...
Emerson Loureiro, Loreno Oliveira, Hyggo Oliveira ...
130
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 7 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...