Sciweavers

890 search results - page 115 / 178
» Programming language methods in computer security
Sort
View
ASPLOS
2012
ACM
12 years 5 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
SIGGRAPH
1993
ACM
14 years 1 months ago
Global visibility algorithms for illumination computations
The most expensive geometric operation in image synthesis is visibility determination. Classically this is solved with hidden surface removal algorithms that render only the parts...
Seth J. Teller, Pat Hanrahan
ECBS
1996
IEEE
93views Hardware» more  ECBS 1996»
14 years 2 months ago
A Methodology for Designing and Dimensioning Critical Complex Computing Systems
It is widely recognized that real-time,fault-tolerant and distributed computing technologies play a key role in the deployment of many current andfuture (civilian or Defense) crit...
Gérard Le Lann

Book
323views
15 years 8 months ago
Adaptive Object-Oriented Software: a PWS book
"This book introduces a software development method, called the Demeter Method, for developing adaptive object-oriented software. The reader will learn the Demeter Method for...
Karl J. Lieberherr
IFIP
2003
Springer
14 years 3 months ago
Soft Output Bit Error Rate Estimation for WCDMA
This paper introduces a method that computes an estimation of the bit error rate (BER) based on the RAKE receiver soft output only. For this method no knowledge is needed about the...
Lodewijk T. Smit, Gerard J. M. Smit, Johann Hurink...