Sciweavers

753 search results - page 140 / 151
» Completing a (k - 1)-Assignment
Sort
View
IFIP
1994
Springer
13 years 10 months ago
Investigating the use of interactive hypermedia systems
There have been innumerable glowing reports of the way hypermedia systems allow users to explore and use vast amounts of information in ways not possible using traditional informa...
Peter Evans II
SIGGRAPH
1993
ACM
13 years 10 months ago
Radioptimization: goal based rendering
This paper presents a method for designing the illumination in an environment using optimization techniques applied to a radiosity based image synthesis system. An optimization of...
John K. Kawai, James S. Painter, Michael F. Cohen
FPCA
1989
13 years 10 months ago
A Simple Semantics for ML Polymorphism
We give a framework for denotational semantics for the polymorphic “core” of the programming language ML. This framework requires no more semantic material than what is needed...
Atsushi Ohori
DATE
2010
IEEE
175views Hardware» more  DATE 2010»
13 years 10 months ago
Approximate logic synthesis for error tolerant applications
─ Error tolerance formally captures the notion that – for a wide variety of applications including audio, video, graphics, and wireless communications – a defective chip that...
Doochul Shin, Sandeep K. Gupta
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 10 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore