Sciweavers

1551 search results - page 275 / 311
» How Typical is the
Sort
View
CHI
1999
ACM
14 years 3 months ago
A Better Mythology for System Design
The past decades have seen huge improvements in computer systems but these have proved difficult to translate into comparable improvements in the usability and social integration)...
Jed Harris, D. Austin Henderson Jr.
POPL
1999
ACM
14 years 3 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett
ICPP
1999
IEEE
14 years 3 months ago
An Offline Algorithm for Dimension-Bound Analysis
The vector-clock size necessary to characterize causality in a distributed computation is bounded by the dimension of the partial order induced by that computation. In an arbitrar...
Paul A. S. Ward
AIMDM
1999
Springer
14 years 3 months ago
Active Shape Models for Customised Prosthesis Design
Abstract. Images and computer graphics play an increasingly important role in the design and manufacture of medical prostheses and implants. Images provide guidance on optimal desi...
Tim J. Hutton, Peter Hammond, John C. Davenport
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
14 years 3 months ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance