Sciweavers

7430 search results - page 1376 / 1486
» Programming Applications in CIFF
Sort
View
106
Voted
ECR
2006
107views more  ECR 2006»
15 years 2 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
116
Voted
IIE
2008
149views more  IIE 2008»
15 years 2 months ago
Information Technologies for Biology Education: Computerized Electrophysiology of Plant Cells
Abstract. Biology has moved from a bench-based discipline to a bioinformational science in modern times but application of computational and analytical methods of informatics in it...
Vilma Kisnieriene, Kastytis Beitas, Vidmantas Saka...
124
Voted
ENTCS
2006
137views more  ENTCS 2006»
15 years 2 months ago
Coalgebraic Description of Generalized Binary Methods
We extend the Reichel-Jacobs coalgebraic account of specification and refinement of objects and classes in Object Oriented Programming to (generalized) binary methods. These are m...
Furio Honsell, Marina Lenisa, Rekha Redamalla
120
Voted
ENTCS
2006
100views more  ENTCS 2006»
15 years 2 months ago
Towards a Logic for Performance and Mobility
Klaim is an experimental language designed for modeling and programming distributed systems composed of mobile components where distribution awareness and dynamic system architect...
Rocco De Nicola, Joost-Pieter Katoen, Diego Latell...
98
Voted
EWC
2006
61views more  EWC 2006»
15 years 2 months ago
Embarrassingly parallel mesh refinement by edge subdivision
We have previously proposed a new technique for the communication-free adaptive refinement of tetrahedral meshes that works for all configurations. Implementations of the scheme mu...
David C. Thompson, Philippe P. Pébay
« Prev « First page 1376 / 1486 Last » Next »