Sciweavers

1893 search results - page 191 / 379
» Computational composites
Sort
View
CCS
2004
ACM
14 years 4 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
SIGGRAPH
2000
ACM
14 years 3 months ago
Lapped textures
We present a method for creating texture over an arbitrary surface mesh using an example 2D texture. The approach is to identify interesting regions (texture patches) in the 2D ex...
Emil Praun, Adam Finkelstein, Hugues Hoppe
IPPS
1999
IEEE
14 years 3 months ago
Mechanical Verification of a Garbage Collector
Abstract. We describe how the PVS verification system has been used to verify a safety property of a garbage collection algorithm, originally suggested by Ben-Ari. The safety prope...
Klaus Havelund
ECOOPW
1998
Springer
14 years 3 months ago
Run-Time Adaptability of Synchronization Policies in Concurrent Object Oriented Languages
Adaptability has become one of the most important research areas in concurrent object-oriented systems in recent years. It tries to cope with system evolution by adding/replacing ...
Fernando Sánchez, Juan Hernández N&u...
ICCS
1998
Springer
14 years 3 months ago
Handling Specification Knowledge Evolution Using Context Lattices
Internet-based information technologies have considerable potential for improving collaboration in professional communities. In this paper, we explain the concept of user-driven sp...
Aldo de Moor, Guy W. Mineau