Sciweavers

1407 search results - page 241 / 282
» The Use of Overloading in Java Programs
Sort
View
118
Voted
INTERNET
2008
150views more  INTERNET 2008»
15 years 2 months ago
Convenience Over Correctness
ion. First described in RFC 707,1 with implementation approaches and details later provided by Andrew Birrell and Bruce Nelson,2 RPC has influenced distributed systems research and...
Steve Vinoski
BMCBI
2004
200views more  BMCBI 2004»
15 years 2 months ago
ABC: software for interactive browsing of genomic multiple sequence alignment data
Background: Alignment and comparison of related genome sequences is a powerful method to identify regions likely to contain functional elements. Such analyses are data intensive, ...
Gregory M. Cooper, Senthil A. G. Singaravelu, Aren...
SGAI
2007
Springer
15 years 8 months ago
Extending Jess to Handle Uncertainty
Computer scientists are often faced with the challenge of having to model the world and its associated uncertainties. One area in particular where modelling uncertainty is importa...
David Corsar, Derek H. Sleeman, Anne McKenzie
94
Voted
ACSAC
2006
IEEE
15 years 8 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toyâ...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
VRML
2000
ACM
15 years 6 months ago
3D behavioral model design for simulation and software engineering
Modeling is used to build structures that serve as surrogates for other objects. As children, we learn to model at a very young age. An object such as a small toy train teaches us...
Paul A. Fishwick