Sciweavers

22358 search results - page 4241 / 4472
» Software Performance Engineering
Sort
View
CIIT
2007
161views Communications» more  CIIT 2007»
15 years 4 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
CASCON
2008
100views Education» more  CASCON 2008»
15 years 4 months ago
Is it a bug or an enhancement?: a text-based approach to classify change requests
Bug tracking systems are valuable assets for managing maintenance activities. They are widely used in open-source projects as well as in the software industry. They collect many d...
Giuliano Antoniol, Kamel Ayari, Massimiliano Di Pe...
DAGSTUHL
2007
15 years 4 months ago
QUAD: Overview and Recent Developments
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [6]. The cipher relies on the iteration of a multivaria...
David Arditti, Côme Berbain, Olivier Billet,...
134
Voted
DAIS
2008
15 years 4 months ago
Adaptive Web Service Migration
In highly dynamic and heterogeneous environments such as mobile and ubiquitous computing, software must be able to adapt at runtime and react to the environment. Furthermore it sho...
Holger Schmidt, Rüdiger Kapitza, Franz J. Hau...
EUSFLAT
2007
152views Fuzzy Logic» more  EUSFLAT 2007»
15 years 4 months ago
Object Oriented Approach in Fuzzy Arithmetic Using Parametric Representation of Fuzzy Numbers
Parametric representation of fuzzy numbers (PFN) with derived methods for performing fuzzy arithmetic proves to have better accuracy and similar computational speed to using trian...
Frantisek Hunka
« Prev « First page 4241 / 4472 Last » Next »