Sciweavers

1116 search results - page 195 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ISMIS
1994
Springer
13 years 11 months ago
Recognizing Credible Experts in Inaccurate Databases
Abstract: While the problem of incompletedata in databases has been extensively studied, a relatively unexplored form of uncertainty in databases, called inaccurate data, demands d...
Hasan M. Jamil, Fereidoon Sadri
SIGGRAPH
1989
ACM
13 years 11 months ago
Analytical methods for dynamic simulation of non-penetrating rigid bodies
A method for analytically calculating the forces between systems of rigid bodies in resting (non-colliding) contact is presented. The systems of bodies may either be in motion or ...
David Baraff
CC
2006
Springer
182views System Software» more  CC 2006»
13 years 11 months ago
Selective Runtime Memory Disambiguation in a Dynamic Binary Translator
Abstract. Alias analysis, traditionally performed statically, is unsuited for a dynamic binary translator (DBT) due to incomplete control-flow information and the high complexity o...
Bolei Guo, Youfeng Wu, Cheng Wang, Matthew J. Brid...
FCCM
2004
IEEE
103views VLSI» more  FCCM 2004»
13 years 11 months ago
A Dynamically-Reconfigurable, Power-Efficient Turbo Decoder
The development of turbo codes has allowed for nearShannon limit information transfer in modern communication systems. Although turbo decoding is viewed as superior to alternate d...
Jian Liang, Russell Tessier, Dennis Goeckel
ER
2006
Springer
96views Database» more  ER 2006»
13 years 11 months ago
Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling
: Data Provenance refers to the lineage of data including its origin, key events that occur over the course of its lifecycle, and other details associated with data creation, proce...
Sudha Ram, Jun Liu