Sciweavers

35419 search results - page 6876 / 7084
» How are we doing
Sort
View
PEPM
2009
ACM
16 years 1 months ago
Bidirectional data-flow analyses, type-systematically
We show that a wide class of bidirectional data-flow analyses and program optimizations based on them admit declarative descriptions in the form of type systems. The salient feat...
Maria João Frade, Ando Saabas, Tarmo Uustal...
136
Voted
CSCW
2010
ACM
16 years 1 months ago
Are you having difficulty?
It would be useful if software engineers/instructors could be aware that remote team members/students are having difficulty with their programming tasks. We have developed an appr...
Jason Carter, Prasun Dewan
EUROGRAPHICS
2010
Eurographics
16 years 17 days ago
Tetrahedral Embedded Boundary Methods for Accurate and Flexible Adaptive Fluids
When simulating fluids, tetrahedral methods provide flexibility and ease of adaptivity that Cartesian grids find difficult to match. However, this approach has so far been lim...
Christopher Batty, Stefan Xenos, Ben Houston
WWW
2010
ACM
15 years 11 months ago
A client-server architecture for state-dependent dynamic visualizations on the web
As sophisticated enterprise applications move to the Web, some advanced user experiences become difficult to migrate due to prohibitively high computation, memory, and bandwidth r...
Daniel Coffman, Danny Soroker, Chandra Narayanaswa...
TCC
2010
Springer
163views Cryptology» more  TCC 2010»
15 years 11 months ago
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
Introduced by Micali, Rabin and Kilian (MRK), the basic primitive of zero-knowledge sets (ZKS) allows a prover to commit to a secret set S so as to be able to prove statements such...
Benoît Libert, Moti Yung
« Prev « First page 6876 / 7084 Last » Next »