Sciweavers

699 search results - page 117 / 140
» Computation of Interprocedural Control Dependence
Sort
View
POPL
2008
ACM
14 years 10 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
COMPSAC
2007
IEEE
14 years 1 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...
AUTOMATICA
1999
122views more  AUTOMATICA 1999»
13 years 9 months ago
Set-valued methods for linear parameter varying systems,
We consider stability analysis and state feedback synthesis for Linear Parameter Varying (LPV) systems. LPV systems are de"ned as linear systems whose dynamics depend on exog...
Jeff S. Shamma, Dapeng Xiong
GECCO
2003
Springer
133views Optimization» more  GECCO 2003»
14 years 3 months ago
Dynamic Strategies in a Real-Time Strategy Game
Abstract. Most modern real-time strategy computer games have a sophisticated but fixed ‘AI’ component that controls the computer’s actions. Once the user has learned how suc...
William Joseph Falke II, Peter Ross
VISUALIZATION
2002
IEEE
14 years 2 months ago
Rendering The First Star In The Universe - A Case Study
For quantitative examination of phenomena that simultaneously occur on very different spatial and temporal scales, adaptive hierarchical schemes are required. A special numerical ...
Ralf Kähler, Donna Cox, Robert Patterson, Stu...