Sciweavers

745 search results - page 139 / 149
» Towards a Formal Approach for Object Database Design
Sort
View
OOPSLA
2009
Springer
15 years 4 months ago
CZ: multiple inheritance without diamonds
Multiple inheritance has long been plagued with the “diamond” inheritance problem, leading to solutions that restrict expressiveness, such as mixins and traits. Instead, we ad...
Donna Malayeri, Jonathan Aldrich
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
14 years 11 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
IADIS
2004
14 years 11 months ago
Telecollaboration - a case study for performance analysis of voip systems
The evolving nature of complex traffic issues of IP (Internet Protocol)-based Telecollaboration (TC) business system technology requires an intuitive understanding for the partici...
Venkatesh Mahadevan, Zenon Chaczko
JCP
2008
142views more  JCP 2008»
14 years 9 months ago
QoS Aware Query Processing Algorithm for Wireless Sensor Networks
In sensor networks, continuous query is commonly used for collecting periodical data from the objects under monitoring. This sort of queries needs to be carefully designed, in orde...
Jun-Zhao Sun
GECCO
2008
Springer
163views Optimization» more  GECCO 2008»
14 years 11 months ago
Embedded evolutionary multi-objective optimization for worst case robustness
In Multi-Objective Problems (MOPs) involving uncertainty, each solution might be associated with a cluster of performances in the objective space depending on the possible scenari...
Gideon Avigad, Jürgen Branke