Sciweavers

9209 search results - page 1799 / 1842
» Data Space Randomization
Sort
View
SIGADA
2004
Springer
14 years 4 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
UPP
2004
Springer
14 years 4 months ago
Inverse Design of Cellular Automata by Genetic Algorithms: An Unconventional Programming Paradigm
Evolving solutions rather than computing them certainly represents an unconventional programming approach. The general methodology of evolutionary computation has already been know...
Thomas Bäck, Ron Breukelaar, Lars Willmes
COOPIS
2003
IEEE
14 years 4 months ago
Providing a Progressive Access to Awareness Information
Awareness has now become a widely accepted central feature in groupware systems. In this context, providing an awareness support consists in delivering to users involved in a colla...
Manuele Kirsch-Pinheiro, Marlène Villanova-...
MICRO
2003
IEEE
125views Hardware» more  MICRO 2003»
14 years 4 months ago
WaveScalar
Silicon technology will continue to provide an exponential increase in the availability of raw transistors. Effectively translating this resource into application performance, how...
Steven Swanson, Ken Michelson, Andrew Schwerin, Ma...
COMPGEOM
2003
ACM
14 years 4 months ago
Cost-driven octree construction schemes: an experimental study
Given a scene consisting of objects, ray shooting queries answer with the first object encountered by a given ray, and are used in ray tracing and radiosity for rendering photo-r...
Boris Aronov, Hervé Brönnimann, Allen ...
« Prev « First page 1799 / 1842 Last » Next »