Sciweavers

2478 search results - page 87 / 496
» Quadtrees as an Abstract Domain
Sort
View
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
12 years 11 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
AIPS
2011
12 years 11 months ago
Visual Programming of Plan Dynamics Using Constraints and Landmarks
In recent years, there has been considerable interest in the use of planning techniques in new media and computer games. Many traditional planning notions no longer apply in the c...
Julie Porteous, Jonathan Teutenberg, David Pizzi, ...
SCHOLARPEDIA
2011
12 years 11 months ago
N-body simulations
Abstract. Scientists’ ability to generate and collect massive-scale datasets is increasing. As a result, constraints in data analysis capability rather than limitations in the av...
AGP
1999
IEEE
14 years 12 days ago
Enhancing Sharing for Precision
Regarding the precision of combined domains including Jacobs and Langen's Sharing there is a core of techniques, such as the standard integration with freeness and linearity ...
Roberto Bagnara, Enea Zaffanella, Patricia M. Hill
EWC
2010
112views more  EWC 2010»
13 years 6 months ago
Meshing volumes with curved boundaries
Abstract This paper introduces a three-dimensional mesh generation algorithm for domains whose boundaries are curved surfaces, possibly with sharp features. The algorithm combines ...
Steve Oudot, Laurent Rineau, Mariette Yvinec