Sciweavers

431 search results - page 81 / 87
» The five orders of ignorance
Sort
View
HIPC
2003
Springer
15 years 2 months ago
POMA: Prioritized Overlay Multicast in Ad Hoc Environments
Abstract: Overlay Multicast networks in mobile ad-hoc environments have received much attention due to their increasing number of practical applications. Although overlay multicast...
Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Li Xi...
MSR
2010
ACM
15 years 2 months ago
Validity of network analyses in Open Source Projects
—Social network methods are frequently used to analyze networks derived from Open Source Project communication and collaboration data. Such studies typically discover patterns in...
Roozbeh Nia, Christian Bird, Premkumar T. Devanbu,...
ICSM
2002
IEEE
15 years 2 months ago
Constraining Software Evolution
Software is multidimensional but the tools that support it are not. The lack of tool support causes the software artifacts representing different dimensions to evolve independentl...
Steven P. Reiss
FQAS
1998
Springer
118views Database» more  FQAS 1998»
15 years 1 months ago
Partial Answers for Unavailable Data Sources
Abstract. Many heterogeneous database system products and prototypes exist today; they will soon be deployed in a wide variety of environments. Most existing systems suffer from an...
Philippe Bonnet, Anthony Tomasic
CAV
2010
Springer
225views Hardware» more  CAV 2010»
15 years 1 months ago
Merit: An Interpolating Model-Checker
Abstract. We present the tool MERIT, a CEGAR model-checker for safety propf counter-systems, which sits in the Lazy Abstraction with Interpolants (LAWI) framework. LAWI is parametr...
Nicolas Caniart