Sciweavers

41938 search results - page 8315 / 8388
» Complex Systems Modeling
Sort
View
NSPW
2003
ACM
14 years 3 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
SIGGRAPH
2003
ACM
14 years 3 months ago
Perceptual evaluation of tone mapping operators
A number of successful tone mapping operators for contrast compression have been proposed due to the need to visualize high dynamic range (HDR) images on low dynamic range devices...
Frédéric Drago, William L. Martens, ...
SIGUCCS
2003
ACM
14 years 3 months ago
Student staff: n. an energetic, brilliant, creative, talented potential rolled into a food-driven, sleep-deprived, unmotivated c
Students are a wonderful resource for any department of a college or university, especially an ITS department. They are inexpensive and abundant. They want to work at strange time...
Karen McRitchie
AGTIVE
2003
Springer
14 years 3 months ago
Specifying Pointer Structures by Graph Reduction
Graph-reduction specifications (GRSs) are a powerful new method for specifying classes of pointer data structures (shapes). They cover important shapes, like various forms of bal...
Adam Bakewell, Detlef Plump, Colin Runciman
ATAL
2003
Springer
14 years 3 months ago
Coalition formation through motivation and trust
Cooperation is the fundamental underpinning of multi-agent systems, allowing agents to interact to achieve their goals. Where agents are self-interested, or potentially unreliable...
Nathan Griffiths, Michael Luck
« Prev « First page 8315 / 8388 Last » Next »