Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Evolving solutions rather than computing them certainly represents an unconventional programming approach. The general methodology of evolutionary computation has already been know...
Awareness has now become a widely accepted central feature in groupware systems. In this context, providing an awareness support consists in delivering to users involved in a colla...
Silicon technology will continue to provide an exponential increase in the availability of raw transistors. Effectively translating this resource into application performance, how...
Steven Swanson, Ken Michelson, Andrew Schwerin, Ma...
Given a scene consisting of objects, ray shooting queries answer with the first object encountered by a given ray, and are used in ray tracing and radiosity for rendering photo-r...