Sciweavers

1156 search results - page 196 / 232
» Compositional Methods for Information-Hiding
Sort
View
SIGGRAPH
1995
ACM
13 years 11 months ago
Polygon-assisted JPEG and MPEG compression of synthetic images
Recent advances in realtime image compression and decompression hardware make it possible for a high-performance graphics engine to operate as a rendering server in a networked en...
Marc Levoy
ACMACE
2008
ACM
13 years 9 months ago
BeatBender: subsumption architecture for autonomous rhythm generation
BeatBender is a computer music project that explores a new method for generating emergent rhythmic drum patterns using the subsumption architecture. Rather than explicitly coding ...
Aaron Levisohn, Philippe Pasquier
ATAL
2008
Springer
13 years 9 months ago
Reusing models in multi-agent simulation with software components
on models are abstract representations of systems one wants to study through computer simulation. In multiagent based simulation, such models usually represent agents and their re...
Paulo Salem da Silva, Ana Cristina Vieira de Melo
CC
2008
Springer
172views System Software» more  CC 2008»
13 years 9 months ago
Efficient Context-Sensitive Shape Analysis with Graph Based Heap Models
The performance of heap analysis techniques has a significant impact on their utility in an optimizing compiler. Most shape analysis techniques perform interprocedural dataflow ana...
Mark Marron, Manuel V. Hermenegildo, Deepak Kapur,...
CEAS
2008
Springer
13 years 9 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...