Sciweavers

1255 search results - page 224 / 251
» On Simple and Secure Key Distribution
Sort
View
131
Voted
ESOP
2006
Springer
15 years 6 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
107
Voted
IWMM
2000
Springer
105views Hardware» more  IWMM 2000»
15 years 6 months ago
Diffusion Tree Restructuring for Indirect Reference Counting
A new variant algorithm for distributed acyclic garbage detection is presented for use in hybrid garbage collectors. The existing fault-tolerance of Piquer's Indirect Referen...
Peter Dickman
103
Voted
SIGGRAPH
1995
ACM
15 years 6 months ago
Applications of irradiance tensors to the simulation of non-Lambertian phenomena
We present new techniques for computing illumination from non-diffuse luminaires and scattering from non-diffuse surfaces. The methods are based on new closed-form expressions d...
James Arvo
134
Voted
ICIA
2007
15 years 5 months ago
VizScript: Visualizing Complex Interactions in Multi-Agent Systems
We address the problem of users creating visualizations to debug and understand multi-agent systems. The key challenges are that (1) needs arise dynamically, i.e., it is difficult...
Jing Jin, Rajiv T. Maheswaran, Romeo Sanchez, Pedr...
141
Voted
ECIR
2010
Springer
15 years 4 months ago
Tripartite Hidden Topic Models for Personalised Tag Suggestion
Abstract. Social tagging systems provide methods for users to categorise resources using their own choice of keywords (or "tags") without being bound to a restrictive set...
Morgan Harvey, Mark Baillie, Ian Ruthven, Mark Jam...