Sciweavers

1560 search results - page 201 / 312
» Order Functions and Evaluation Codes
Sort
View
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
APSEC
2005
IEEE
15 years 10 months ago
Simulation-based Validation and Defect Localization for Evolving, Semi-Formal Requirements Models
When requirements models are developed in an iterative and evolutionary way, requirements validation becomes a major problem. In order to detect and fix problems early, the speci...
Christian Seybold, Silvio Meier
DIGRA
2005
Springer
15 years 10 months ago
CameraBots: Cinematography for Games with Non-Player Characters as Camera Operators
Cinematography describes principles and techniques pertaining to the effective use of cameras to film live action. The correct application of these principles and techniques produ...
James Kneafsey, Hugh McCabe
166
Voted
ASPDAC
2004
ACM
120views Hardware» more  ASPDAC 2004»
15 years 10 months ago
Compiler based exploration of DSP energy savings by SIMD operations
— The growing use of digital signal processors (DSPs) in embedded systems necessitates the use of optimizing compilers supporting their special architecture features. Beside the ...
Markus Lorenz, Peter Marwedel, Thorsten Dräge...
VLDB
2004
ACM
117views Database» more  VLDB 2004»
15 years 10 months ago
XQuery on SQL Hosts
Relational database systems may be turned into efficient XML and XPath processors if the system is provided with a suitable relational tree encoding. This paper extends this relat...
Torsten Grust, Sherif Sakr, Jens Teubner