Sciweavers

5756 search results - page 927 / 1152
» Describing Objects by their Attributes
Sort
View
VISUALIZATION
2005
IEEE
15 years 10 months ago
Visualizing the tightening of knots
The study of physical models for knots has recently received much interest in the mathematics community. In this paper, we consider the ropelength model, which considers knots tie...
Jason Cantarella, Michael Piatek, Eric Rawdon
WCRE
2005
IEEE
15 years 10 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
WORDS
2005
IEEE
15 years 10 months ago
A Framework for Middleware Supporting Real-Time Wide-Area Distributed Computing
: The development of real-time systems that are distributed over a wide area is a significant problem that has challenged researchers for many years. Such systems require precise t...
K. H. (Kane) Kim, Stephen F. Jenks, Larry Smarr, A...
133
Voted
ACMACE
2005
ACM
15 years 10 months ago
MonkeyBridge: autonomous agents in augmented reality games
MonkeyBridge is a collaborative Augmented Reality (AR) game employing autonomous animated agents embodied by lifelike, animated virtual characters and “smart” physical objects...
István Barakonyi, Markus Weilguny, Thomas P...
ACMMSP
2005
ACM
99views Hardware» more  ACMMSP 2005»
15 years 10 months ago
Gated memory control for memory monitoring, leak detection and garbage collection
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
Chen Ding, Chengliang Zhang, Xipeng Shen, Mitsunor...