Sciweavers

796 search results - page 64 / 160
» Spoofing prevention method
Sort
View
FM
2003
Springer
94views Formal Methods» more  FM 2003»
14 years 3 months ago
On Failures and Faults
: Real computer-based systems fail, and hence are often far less dependable than their owners and users need and desire. Individuals, organisations and indeed the world at large ar...
Brian Randell
SSDBM
2002
IEEE
116views Database» more  SSDBM 2002»
14 years 2 months ago
A Conceptual Framework for Composing and Managing Scientific Data Lineage
Scientific research relies as much on the dissemination and exchange of data sets as on the publication of conclusions. Accurately tracking the lineage (origin and subsequent proc...
Rajendra Bose
CDC
2009
IEEE
119views Control Systems» more  CDC 2009»
14 years 2 months ago
Optimal controlled trajectories for a mathematical model of anti-angiogenic therapy in cancer
Abstract— Anti-angiogenic therapy is a novel treatment approach in cancer therapy that aims at preventing a tumor from developing a network of blood vessels and capillaries that ...
Urszula Ledzewicz, Heinz Schättler
SI3D
2009
ACM
14 years 2 months ago
Screen space fluid rendering with curvature flow
We present an approach for rendering the surface of particle-based fluids that is simple to implement, has real-time performance with a configurable speed/quality trade-off, and...
Wladimir J. van der Laan, Simon Green, Miguel Sain...
ISPD
1999
ACM
92views Hardware» more  ISPD 1999»
14 years 2 months ago
Crosstalk constrained global route embedding
- Route Embedding, a new method for mitigating the impact of crosstalk, is presented. It modifies a set of global-route structures to prevent timing and noise-margin violations ca...
Phiroze N. Parakh, Richard B. Brown