Sciweavers

8503 search results - page 1682 / 1701
» Secure Software Architectures
Sort
View
VISUALIZATION
1997
IEEE
14 years 26 days ago
GADGET: goal-oriented application design guidance for modular visualization environments
Modular Visualization Environments (MVEs) have recently been regarded as the de facto standard for scientific data visualization, mainly due to adoption of visual programming sty...
Issei Fujishiro, Yuriko Takeshima, Yoshihiko Ichik...
VISUALIZATION
1996
IEEE
14 years 24 days ago
Hierarchical and Parallelizable Direct Volume Rendering for Irregular and Multiple Grids
A general volume rendering technique is described that efficiently produces images of excellent quality from data defined over irregular grids having a wide variety of formats. Re...
Jane Wilhelms, Allen Van Gelder, Paul Tarantino, J...
ASPLOS
1996
ACM
14 years 24 days ago
A Quantitative Analysis of Loop Nest Locality
This paper analyzes and quantifies the locality characteristics of numerical loop nests in order to suggest future directions for architecture and software cache optimizations. Si...
Kathryn S. McKinley, Olivier Temam
FSE
1994
Springer
134views Cryptology» more  FSE 1994»
14 years 22 days ago
Cryptanalysis of McGuffin
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to differential cryptanalysis as the DES. 1 McGuffin Schneier and...
Vincent Rijmen, Bart Preneel
EKAW
1992
Springer
14 years 22 days ago
eQuality: An Application of DDucks to Process Management
Process management is a method for improving Boeing's business processes, however many aspects have been difficult to implement. eQuality is a software system based on a frame...
Jeffrey Bradshaw, Peter Holm, Oscar Kipersztok, Th...
« Prev « First page 1682 / 1701 Last » Next »