Sciweavers

1003 search results - page 56 / 201
» Understanding Availability
Sort
View
PAM
2009
Springer
15 years 6 months ago
Triangle Inequality and Routing Policy Violations in the Internet
Triangle inequality violations (TIVs) are the effect of packets between two nodes being routed on the longer direct path between them when a shorter detour path through an intermed...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...
IWPC
2009
IEEE
15 years 6 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CSMR
2008
IEEE
15 years 5 months ago
A Flexible Framework to Support Collaborative Software Evolution Analysis
To understand the evolution of software researchers have developed a plethora of tools to parse, model, and analyze the history of systems. Despite their usefulness, a common down...
Marco D'Ambros, Michele Lanza
ICMCS
2008
IEEE
174views Multimedia» more  ICMCS 2008»
15 years 5 months ago
The Vera am Mittag German audio-visual emotional speech database
The lack of publicly available annotated databases is one of the major barriers to research advances on emotional information processing. In this contribution we present a recentl...
Michael Grimm, Kristian Kroschel, Shrikanth Naraya...
ICPADS
2007
IEEE
15 years 5 months ago
Performance analysis on mobile agent-based parallel information retrieval approaches
—The main concern of the Internet user-base has shifted from what kind of information are available to how to find the desired information on the Internet thanks to the explosiv...
Wenyu Qu, Masaru Kitsuregawa, Keqiu Li