Sciweavers

5766 search results - page 1017 / 1154
» Reverse Engineering of Data
Sort
View
GMP
2010
IEEE
246views Solid Modeling» more  GMP 2010»
15 years 9 months ago
Parameterization of Star-Shaped Volumes Using Green's Functions
Abstract. Parameterizations have a wide range of applications in computer graphics, geometric design and many other fields of science and engineering. Although surface parameteriz...
Jiazhi Xia, Ying He 0001, Shuchu Han, Chi-Wing Fu,...
CLOUD
2010
ACM
15 years 9 months ago
Hermes: clustering users in large-scale e-mail services
Hermes is an optimization engine for large-scale enterprise e-mail services. Such services could be hosted by a virtualized e-mail service provider, or by dedicated enterprise dat...
Thomas Karagiannis, Christos Gkantsidis, Dushyanth...
EUROSYS
2010
ACM
15 years 9 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
TRUST
2010
Springer
15 years 9 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
CODES
2002
IEEE
15 years 9 months ago
Energy savings through compression in embedded Java environments
Limited energy and memory resources are important constraints in the design of an embedded system. Compression is an useful and widely employed mechanism to reduce the memory requ...
Guangyu Chen, Mahmut T. Kandemir, Narayanan Vijayk...
« Prev « First page 1017 / 1154 Last » Next »