Sciweavers

13618 search results - page 2581 / 2724
» The Newton Operating System
Sort
View
123
Voted
TKDE
2008
137views more  TKDE 2008»
15 years 3 months ago
GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks
Abstract-- In peer-to-peer (P2P) networks, reputation aggregation and peer ranking are the most time-consuming and spacedemanding operations. This paper proposes a gossip-based rep...
Runfang Zhou, Kai Hwang, Min Cai
141
Voted
TOG
2008
197views more  TOG 2008»
15 years 3 months ago
Two-way coupling of fluids to rigid and deformable solids and shells
We propose a novel solid/fluid coupling method that treats the coupled system in a fully implicit manner making it stable for arbitrary time steps, large density ratios, etc. In c...
Avi Robinson-Mosher, Tamar Shinar, Jon Gretarsson,...
TOG
2008
180views more  TOG 2008»
15 years 3 months ago
Diffusion curves: a vector representation for smooth-shaded images
We describe a new vector-based primitive for creating smoothshaded images, called the diffusion curve. A diffusion curve partitions the space through which it is drawn, defining d...
Alexandrina Orzan, Adrien Bousseau, Holger Winnem&...
153
Voted
TOPLAS
2008
138views more  TOPLAS 2008»
15 years 3 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
120
Voted
TPDS
2008
78views more  TPDS 2008»
15 years 3 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
« Prev « First page 2581 / 2724 Last » Next »