Sciweavers

1821 search results - page 262 / 365
» Security-Aware Program Transformations
Sort
View
130
Voted
SMA
2010
ACM
231views Solid Modeling» more  SMA 2010»
15 years 2 months ago
Conservative swept volume boundary approximation
We present a novel technique for approximating the boundary of a swept volume. The generator given by an input triangle mesh is rendered under all rigid transformations of a discr...
Andreas von Dziegielewski, R. Erbes, Elmar Sch&oum...
CORR
2010
Springer
198views Education» more  CORR 2010»
15 years 2 months ago
Space and the Synchronic A-Ram
Space is a spatial programming language designed to exploit the massive parallelism available in a formal model of computation called the Synchronic A-Ram, and physically related ...
Alexander Victor Berka
CORR
2010
Springer
97views Education» more  CORR 2010»
15 years 2 months ago
Continuation-Passing C, compiling threads to events through continuations
Abstract In this paper, we introduce Continuation Passing C (CPC), a programming language for concurrent systems in which native and cooperative threads are unified and presented t...
Gabriel Kerneis, Juliusz Chroboczek
209
Voted
ICDE
2008
IEEE
208views Database» more  ICDE 2008»
16 years 3 months ago
Clip: a Visual Language for Explicit Schema Mappings
Many data integration solutions in the market today include tools for schema mapping, to help users visually relate elements of different schemas. Schema elements are connected wit...
Alessandro Raffio, Daniele Braga, Mauricio A. Hern...
115
Voted
EUROGRAPHICS
2010
Eurographics
15 years 11 months ago
Rendering Wave Effects with Augmented Light Field
Ray–based representations can model complex light transport but are limited in modeling diffraction effects that require the simulation of wavefront propagation. This paper prov...
Se Baek Oh, Sriram Kashyap, Rohit Garg, Sharat Cha...