Sciweavers

6274 search results - page 1211 / 1255
» Proofs, Programs, Processes
Sort
View
ICARCV
2002
IEEE
149views Robotics» more  ICARCV 2002»
14 years 3 months ago
A fast method to simulate virtual deformable objects with force feedback
In this paper, we propose solutions to real time simulation and interaction of deformable objects in virtual reality. Firstly, we present LEM - Long Element Method, a method creat...
Kenneth Sundaraj, César Mendoza, Christian ...
ICPP
2002
IEEE
14 years 3 months ago
Software Caching using Dynamic Binary Rewriting for Embedded Devices
A software cache implements instruction and data caching entirely in software. Dynamic binary rewriting offers a means to specialize the software cache miss checks at cache miss t...
Chad Huneycutt, Joshua B. Fryman, Kenneth M. Macke...
ICTAI
2002
IEEE
14 years 3 months ago
On Temporal Planning as CSP
(Appears as a regular paper in the proceedings of IEEE International Conference on Tools with Artificial Intelligence (ICTAI), IEEE Computer Society, Washington D.C. Nov. 2002, p...
Amol Dattatraya Mali
IEEEPACT
2002
IEEE
14 years 3 months ago
Transparent Threads: Resource Sharing in SMT Processors for High Single-Thread Performance
Simultaneous Multithreading (SMT) processors achieve high processor throughput at the expense of single-thread performance. This paper investigates resource allocation policies fo...
Gautham K. Dorai, Donald Yeung
SACMAT
2010
ACM
14 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
« Prev « First page 1211 / 1255 Last » Next »