Sciweavers

1153 search results - page 147 / 231
» Reversing graph transformations
Sort
View
IH
2005
Springer
14 years 3 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
IRI
2003
IEEE
14 years 3 months ago
An Information Model of Virtual Collaboration
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collabo...
Robert P. Biuk-Aghai
PG
2003
IEEE
14 years 3 months ago
A State Machine for Real-Time Cutting of Tetrahedral Meshes
We introduce an algorithm that consistently and accurately processes arbitrary intersections in tetrahedral meshes in real-time. The intersection surfaces are modeled up to the cu...
Daniel Bielser, Pascal Glardon, Matthias Teschner,...
ECMDAFA
2010
Springer
135views Hardware» more  ECMDAFA 2010»
14 years 2 months ago
Towards Model Driven Tool Interoperability: Bridging Eclipse and Microsoft Modeling Tools
Successful application of model-driven engineering approaches requires interchanging a lot of relevant data among the tool ecosystem employed by an engineering team (e.g., requirem...
Hugo Bruneliere, Jordi Cabot, Cauê Clasen, F...
RTA
1998
Springer
14 years 2 months ago
Decidable and Undecidable Second-Order Unification Problems
There is a close relationship between word unification and second-order unification. This similarity has been exploited for instance for proving decidability of monadic second-orde...
Jordi Levy