Sciweavers

5244 search results - page 1032 / 1049
» Structural Complexity of AvgBPP
Sort
View
CODES
2005
IEEE
14 years 1 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
ECCB
2005
IEEE
14 years 1 months ago
A query language for biological networks
Many areas of modern biology are concerned with the management, storage, visualization, comparison, and analysis of networks. For instance, networks are used to model signal trans...
Ulf Leser
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
14 years 1 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
ICRA
2005
IEEE
130views Robotics» more  ICRA 2005»
14 years 1 months ago
Effective Constrained Dynamic Simulation Using Implicit Constraint Enforcement
- Stable and effective enforcement of hard constraints is one of the crucial components in controlling physics-based dynamic simulation systems. The conventional explicit Baumgarte...
Min Hong, Min-Hyung Choi, Sunhwa Jung, Samuel W. J...
IEEEPACT
2005
IEEE
14 years 1 months ago
Dual-Core Execution: Building a Highly Scalable Single-Thread Instruction Window
Current integration trends embrace the prosperity of single-chip multi-core processors. Although multi-core processors deliver significantly improved system throughput, single-thr...
Huiyang Zhou
« Prev « First page 1032 / 1049 Last » Next »