Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Shortening Overlong Method Names with Abbreviations
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 8Article No.: 205, Pages 1–24https://doi.org/10.1145/3676959Methods should be named to summarize their responsibilities meaningfully. When a method has a non-trivial responsibility, it may require a naming using multiple words. However, overlong method names are susceptible to typos and reduced readability (e.g., ...
- research-articleJuly 2024
Dual network control system for bottom hole throttling pressure control based on RBF with big data computing
International Journal of Data Mining and Bioinformatics (IJDMB), Volume 28, Issue 3-4Pages 365–380https://doi.org/10.1504/ijdmb.2024.139459In the context of smart city development, the managed pressure drilling (MPD) drilling process faces many uncertainties, but the characteristics of the process are complex and require accurate wellbore pressure control. However, this process runs the ...
- surveyApril 2020
A Survey on Renamings of Software Entities
ACM Computing Surveys (CSUR), Volume 53, Issue 2Article No.: 41, Pages 1–38https://doi.org/10.1145/3379443More than 70% of characters in the source code are used to label identifiers. Consequently, identifiers are one of the most important source for program comprehension. Meaningful identifiers are crucial to understand and maintain programs. However, for ...
- research-articleNovember 2019
The Coerciveness of the Primary Key: Infrastructure Problems in Human Services Work
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 3, Issue CSCWArticle No.: 51, Pages 1–26https://doi.org/10.1145/3359153The premise of a primary key is simple enough: every record or row in a table should have some number or string that can uniquely identify it. Primary keys are essential for linking data spread across database tables, and for looking up and retrieving ...
- ArticleDecember 2014
A Smart Home Architecture Based on Resource Name Service
CSE '14: Proceedings of the 2014 IEEE 17th International Conference on Computational Science and EngineeringPages 1915–1920https://doi.org/10.1109/CSE.2014.351Smart home contains centralized controlled lights, Heating, Ventilation and Air Conditioning (HVAC), appliances, security locks of gates and doors and other intelligent equipment, to provide convenient, comfortable, energy efficient and secure services ...
-
- rfcMay 2014
RFC 7255: Using the International Mobile station Equipment Identity (IMEI) Uniform Resource Name (URN) as an Instance ID
This specification defines how the Uniform Resource Name (URN) reserved for the Global System for Mobile Communications Association (GSMA) identities and its sub-namespace for the International Mobile station Equipment Identity (IMEI) can be used as an ...
- rfcMay 2014
RFC 7254: A Uniform Resource Name Namespace for the Global System for Mobile Communications Association (GSMA) and the International Mobile station Equipment Identity (IMEI)
This specification defines a Uniform Resource Name (URN) namespace for the Global System for Mobile Communications Association (GSMA) and a Namespace Specific String (NSS) for the International Mobile station Equipment Identity (IMEI), as well as an ...
- research-articleNovember 2013
Network layer soft handoff for IP mobility
PM2HW2N '13: Proceedings of the 8th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networksPages 13–20https://doi.org/10.1145/2512840.2512843We present an empirical evaluation of network-layer soft handoff for IP mobility. Such functionality is not currently available for Mobile IP. Our new approach, based on the Identifier Locator Network Protocol (ILNP), requires no additional network ...
- ArticleOctober 2012
Global Resolution Service for mobility support in the internet
ICNP '12: Proceedings of the 2012 20th IEEE International Conference on Network Protocols (ICNP)Pages 1–2https://doi.org/10.1109/ICNP.2012.6459957Resolution from identifiers to locators serves as a key component of mapping-based mobility solutions. In this paper we address the weakness of current resolution methods in supporting diverse mobility scenarios and propose a Global Resolution Service ...
- research-articleSeptember 2012
Mobility support in the internet using identifiers
CFI '12: Proceedings of the 7th International Conference on Future Internet TechnologiesPages 37–42https://doi.org/10.1145/2377310.2377322To support mobility in the Internet is becoming an urgent need in the near future. So far a large number of solutions are proposed providing various methods, but there still exist many open questions on how to add the new feature of mobility into the ...
- ArticleMarch 2012
Identifier-Based Context-Dependent API Method Recommendation
CSMR '12: Proceedings of the 2012 16th European Conference on Software Maintenance and ReengineeringPages 31–40https://doi.org/10.1109/CSMR.2012.14Reuse recommendation systems support the developer by suggesting useful API methods, classes or code snippets based on code edited in the IDE. Existing systems based on structural information, such as type and method usage, are not effective in case of ...
- rfcDecember 2011
RFC 6453: A URN Namespace for the Open Grid Forum (OGF)
This document describes a URN (Uniform Resource Name) namespace that is engineered by the Open Grid Forum (OGF) for naming persistent resources. This document is not an Internet Standards Track specification; it is published for informational purposes.
- ArticleJune 2011
Mobility Management Research of Internet Based on the Splitting Mechanism
IMIS '11: Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous ComputingPages 481–486https://doi.org/10.1109/IMIS.2011.71This paper proposes a new Internet architecture based on splitting Mechanism. It separates the Internet access networks from the core network, and makes the IPv6 routing both in access networks and the core network more scalable. Furthermore, this paper ...
- research-articleJune 2011
UNA: a new internet architecture for user-level multi-homing and mobility
CFI '11: Proceedings of the 6th International Conference on Future Internet TechnologiesPages 13–18https://doi.org/10.1145/2002396.2002400Host multi-homing and mobility in the Internet have become a trend due to the widespread wireless services and broad access methods. Meanwhile, with more and more devices join in the Internet, it will be common that one user has multiple devices online. ...
- research-articleJune 2011
YANAIL: yet another definition on names, addresses, identifiers, and locators
CFI '11: Proceedings of the 6th International Conference on Future Internet TechnologiesPages 8–12https://doi.org/10.1145/2002396.2002399This paper proposes a new definition on names, addresses, identifiers, and locators based on a different framework. Starting with observation of the patterns how those terms are used, a new definition for the terms and their relations are presented. ...
- ArticleJuly 2010
MEGACO correlation method
Starting from Rel4 appears a separation of CP (Control Plane) and UP (User Plane) management within the networks. MEGACO protocol plays an important role in the migration to the new releases or from monolithic platform to a network with distributed ...
- research-articleNovember 2009
Non-model self-learning control of nonlinear system
ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and HumanPages 1223–1226https://doi.org/10.1145/1655925.1656148In this paper, one method of non-model error self-learning control of inverse system based on BP networks is presented. The input and output of the system is identified rapidly by BP networks and its momentum BP algorithm. Error controller is ...
- ArticleNovember 2009
Intelligent Learning Control of Hydraulic Flow Regulating Pump with Neural Network Load Flow Identifier
AICI '09: Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence - Volume 02Pages 539–543https://doi.org/10.1109/AICI.2009.53To solve the problem of power loss of load flow detection in hydraulic flow regulating pump (HFRP), a new method to identify load flow by using neural network load flow identifier (NNLFI) is proposed. To improve the load flow regulating accuracy of HFRP ...
- research-articleFebruary 2009
An efficient method of image identification by combining image features
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and CommunicationPages 607–611https://doi.org/10.1145/1516241.1516348This paper proposes an efficient image identification method by combining image features and using image clustering. For more efficient image identification, we use global and local features in a hierarchical manner. The combined global feature ...
- chapterDecember 2008
A Grid Information Services Architecture Based on Structured P2P Systems
Computer Supported Cooperative Work in Design IVDecember 2008, Pages 374–383https://doi.org/10.1007/978-3-540-92719-8_34Structured P2P systems prove efficient in query operation and adaptive dynamic updates. This paper presents a Grid information services architecture based on structured P2P topology, namely distributed hash table (DHT). It resolves problems which ...