Sciweavers

264 search results - page 42 / 53
» Source-Based Trace Exploration
Sort
View
CONEXT
2007
ACM
15 years 1 months ago
On the cost of caching locator/ID mappings
Very recent activities in the IETF and in the Routing Research Group (RRG) of the IRTG focus on defining a new Internet architecture, in order to solve scalability issues related ...
Luigi Iannone, Olivier Bonaventure
FSEN
2009
Springer
15 years 1 months ago
Executable Interface Specifications for Testing Asynchronous Creol Components
We propose and explore a formal approach for black-box testing asynchronously communicating components in open environments. Asynchronicity poses a challenge for validating and tes...
Immo Grabe, Marcel Kyas, Martin Steffen, Arild B. ...
87
Voted
AAAI
2007
14 years 12 months ago
Detecting Execution Failures Using Learned Action Models
reason with abstracted models of the behaviours they use to construct plans. When plans are turned into the instructions that drive an executive, the real behaviours interacting w...
Maria Fox, Jonathan Gough, Derek Long
IMC
2007
ACM
14 years 11 months ago
Usage-based dhcp lease time optimization
The Dynamic Host Configuration Protocol (DHCP) is used to dynamically allocate address space to hosts on a local area network. Despite its widespread usage, few studies exist on ...
Manas Khadilkar, Nick Feamster, Matt Sanders, Russ...
GRAPHICSINTERFACE
2007
14 years 11 months ago
Point-based stream surfaces and path surfaces
We introduce a point-based algorithm for computing and rendering stream surfaces and path surfaces of a 3D flow. The points are generated by particle tracing, and an even distrib...
Tobias Schafhitzel, Eduardo Tejada, Daniel Weiskop...