Sciweavers

529 search results - page 13 / 106
» C Essentials
Sort
View
FAST
2008
13 years 10 months ago
An Analysis of Data Corruption in the Storage Stack
An important threat to reliable storage of data is silent data corruption. In order to develop suitable protection mechanisms against data corruption, it is essential to understan...
Lakshmi N. Bairavasundaram, Garth R. Goodson, Bian...
IJCAI
2003
13 years 9 months ago
Great Expectations. Part II: Generalized Expected Utility as a Universal Decision Rule
Many different rules for decision making have been introduced in the literature. We show that a notion of generalized expected utility proposed in [Chu and Halpern 2003] is a uni...
Francis C. Chu, Joseph Y. Halpern
USENIX
2003
13 years 9 months ago
The CryptoGraphic Disk Driver
We present the design and implementation of CGD, the CryptoGraphic Disk driver. CGD is a pseudo-device driver that sits below the buffer cache, and provides an encrypted view of a...
Roland C. Dowdeswell, John Ioannidis
VISSYM
2003
13 years 9 months ago
Case Study: Comparing Two Methods for Filtering External Motion in 4D Confocal Microscopy Data
In this case study, we compare two methods for filtering external motion in time dependent volume data sets acquired from confocal microscopy. The pros and cons of a landmark bas...
Wim C. de Leeuw, Robert van Liere
IVCNZ
1998
13 years 9 months ago
A Survey and Evaluation of Mesh Reduction Techniques
: Large polygon meshes are a common entity in scienti c and engineering science. Polygon meshes can be used for simpli ed geometric operations such as collision detection and surfa...
Burkhard Wünsche