Sciweavers

3256 search results - page 566 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
CGF
2004
102views more  CGF 2004»
15 years 4 months ago
Real-time Light Animation
Light source animation is a particularly hard field of real-time global illumination algorithms since moving light sources result in drastic illumination changes and make coherenc...
Mateu Sbert, László Szécsi, L...
115
Voted
PVLDB
2008
105views more  PVLDB 2008»
15 years 4 months ago
Transaction time indexing with version compression
Immortal DB is a transaction time database system designed to enable high performance for temporal applications. It is built into a commercial database engine, Microsoft SQL Serve...
David B. Lomet, Mingsheng Hong, Rimma V. Nehme, Ru...
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 8 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
153
Voted
BIRTHDAY
2012
Springer
14 years 10 days ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...
148
Voted
DAC
2007
ACM
16 years 5 months ago
Energy-Aware Data Compression for Multi-Level Cell (MLC) Flash Memory
We discover significant value-dependent programming energy variations in multi-level cell (MLC) flash memories, and introduce an energy-aware data compression method that minimize...
Yongsoo Joo, Youngjin Cho, Donghwa Shin, Naehyuck ...