Sciweavers

1116 search results - page 158 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CC
2004
Springer
110views System Software» more  CC 2004»
14 years 1 months ago
Pruning Interference and Ready Dependence for Slicing Concurrent Java Programs
In this paper, we show how previous work on escape analysis can be adapted and extended to yield a static analysis that is efficient yet effective for reducing the number of inter...
Venkatesh Prasad Ranganath, John Hatcliff
SC
1995
ACM
13 years 11 months ago
A Novel Approach Towards Automatic Data Distribution
: Data distribution is one of the key aspects that a parallelizing compiler for a distributed memory architecture should consider, in order to get efficiency from the system. The ...
Jordi Garcia, Eduard Ayguadé, Jesús ...
GRAPHICSINTERFACE
2004
13 years 9 months ago
Interactive Image-Based Exploded View Diagrams
We present a system for creating interactive exploded view diagrams using 2D images as input. This imagebased approach enables us to directly support arbitrary rendering styles, e...
Wilmot Li, Maneesh Agrawala, David Salesin
JCC
2007
110views more  JCC 2007»
13 years 7 months ago
Electron correlation: The many-body problem at the heart of chemistry
Abstract: The physical interactions among electrons and nuclei, responsible for the chemistry of atoms and molecules, is well described by quantum mechanics and chemistry is theref...
David P. Tew, Wim Klopper, Trygve Helgaker
USS
2010
13 years 5 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...