Sciweavers

3238 search results - page 26 / 648
» Not Enough Points Is Enough
Sort
View
ISCA
1998
IEEE
122views Hardware» more  ISCA 1998»
13 years 12 months ago
Design Choices in the SHRIMP System: An Empirical Study
The SHRIMP cluster-computing system has progressed to a point of relative maturity; a variety of applications are running on a 16-node system. We have enough experience to underst...
Matthias A. Blumrich, Richard Alpert, Yuqun Chen, ...
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
13 years 11 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
COCOON
2006
Springer
13 years 11 months ago
Restricted Mesh Simplification Using Edge Contractions
We consider the problem of simplifying a triangle mesh using edge contractions, under the restriction that the resulting vertices must be a subset of the input set. That is, contr...
Mattias Andersson, Joachim Gudmundsson, Christos L...
FOSSACS
2006
Springer
13 years 11 months ago
Bigraphical Models of Context-Aware Systems
Abstract. As part of ongoing work on evaluating Milner's bigraphical reactive systems, we investigate bigraphical models of context-aware systems, a facet of ubiquitous comput...
Lars Birkedal, Søren Debois, Ebbe Elsborg, ...
APSEC
2001
IEEE
13 years 11 months ago
A Component-Based Framework and Reusability in Garment
is a mechanism for abstraction and encapsulation of languages. It aims to make the best support on the definition and implementation of new languages, especially DSLs (Domain Spec...
Naixiao Zhang, Ying Liu