Sciweavers

8503 search results - page 1682 / 1701
» Secure Software Architectures
Sort
View
VISUALIZATION
1997
IEEE
15 years 6 months ago
GADGET: goal-oriented application design guidance for modular visualization environments
Modular Visualization Environments (MVEs) have recently been regarded as the de facto standard for scientific data visualization, mainly due to adoption of visual programming sty...
Issei Fujishiro, Yuriko Takeshima, Yoshihiko Ichik...
115
Voted
VISUALIZATION
1996
IEEE
15 years 6 months ago
Hierarchical and Parallelizable Direct Volume Rendering for Irregular and Multiple Grids
A general volume rendering technique is described that efficiently produces images of excellent quality from data defined over irregular grids having a wide variety of formats. Re...
Jane Wilhelms, Allen Van Gelder, Paul Tarantino, J...
ASPLOS
1996
ACM
15 years 6 months ago
A Quantitative Analysis of Loop Nest Locality
This paper analyzes and quantifies the locality characteristics of numerical loop nests in order to suggest future directions for architecture and software cache optimizations. Si...
Kathryn S. McKinley, Olivier Temam
126
Voted
FSE
1994
Springer
134views Cryptology» more  FSE 1994»
15 years 6 months ago
Cryptanalysis of McGuffin
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to differential cryptanalysis as the DES. 1 McGuffin Schneier and...
Vincent Rijmen, Bart Preneel
160
Voted
EKAW
1992
Springer
15 years 6 months ago
eQuality: An Application of DDucks to Process Management
Process management is a method for improving Boeing's business processes, however many aspects have been difficult to implement. eQuality is a software system based on a frame...
Jeffrey Bradshaw, Peter Holm, Oscar Kipersztok, Th...
« Prev « First page 1682 / 1701 Last » Next »