Sciweavers

2940 search results - page 530 / 588
» Adaptive control of PDEs
Sort
View
CCS
2003
ACM
14 years 2 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
VISUALIZATION
2002
IEEE
14 years 1 months ago
Rendering The First Star In The Universe - A Case Study
For quantitative examination of phenomena that simultaneously occur on very different spatial and temporal scales, adaptive hierarchical schemes are required. A special numerical ...
Ralf Kähler, Donna Cox, Robert Patterson, Stu...
ICSM
1999
IEEE
14 years 1 months ago
A Two-Phase Process for Software Architecture Improvement
Software architecture is important for large systems in which it is the main means for, among other things, controlling complexity. Current ideas on software architectures were no...
René L. Krikhaar, André Postma, M. P...
DEXAW
1998
IEEE
92views Database» more  DEXAW 1998»
14 years 1 months ago
Self-Configuring Components for Client-/Server-Applications
A mechanistic view of software component assembly implies exact matching and fitting of the particular components. We argue that components for large-scale software construction s...
Wolfgang Pree, Egbert Althammer, Hermann Sikora
RTAS
1997
IEEE
14 years 1 months ago
Exploiting Redundancy for Timeliness in TCP Boston
While ATM bandwidth-reservation techniques are able to o er the guarantees necessary for the delivery of real-time streams in many applications (e.g. live audio and video), they s...
Azer Bestavros, Gitae Kim