Sciweavers

4761 search results - page 730 / 953
» Generalizing Boundary Points
Sort
View
201
Voted
MAS
1998
Springer
172views Communications» more  MAS 1998»
15 years 8 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
RECOMB
1998
Springer
15 years 8 months ago
Alignments without low-scoring regions
Given a strong match between regions of two sequences, how far can the match be meaningfully extended if gaps are allowed in the resulting alignment? The aim is to avoid searching...
Zheng Zhang 0004, Piotr Berman, Webb Miller
IPPS
1997
IEEE
15 years 8 months ago
Nearly Optimal One-To-Many Parallel Routing in Star Networks
Star networks were proposedrecently as an attractive alternative to the well-known hypercube models for interconnection networks. Extensive research has been performed that shows ...
Chi-Chang Chen, Jianer Chen
CHI
1997
ACM
15 years 8 months ago
WorldBeat: Designing a Baton-Based Interface for an Interactive Music Exhibit
This paper presents the interface design of the WorldBeat system, an interactive exhibit about using computers in musical education, and as musical instruments. The system allows ...
Jan O. Borchers
ISPD
1997
ACM
186views Hardware» more  ISPD 1997»
15 years 8 months ago
EWA: exact wiring-sizing algorithm
The wire sizing problem under inequality Elmore delay constraints is known to be posynomial, hence convex under an exponential variable-transformation. There are formal methods fo...
Rony Kay, Gennady Bucheuv, Lawrence T. Pileggi