Sciweavers

13618 search results - page 2633 / 2724
» The Newton Operating System
Sort
View
UIST
2006
ACM
14 years 4 months ago
A direct texture placement and editing interface
The creation of most models used in computer animation and computer games requires the assignment of texture coordinates, texture painting, and texture editing. We present a novel...
Yotam I. Gingold, Philip L. Davidson, Jefferson Y....
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 4 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
WIDM
2006
ACM
14 years 4 months ago
SRI: exploiting semantic information for effective query routing in a PDMS
The huge amount of data available from Internet information sources has focused much attention on the sharing of distributed information through Peer Data Management Systems (PDMS...
Federica Mandreoli, Riccardo Martoglia, Simona Sas...
ICDCS
2005
IEEE
14 years 3 months ago
Flexible Consistency for Wide Area Peer Replication
The lack of a flexible consistency management solution hinders P2P implementation of applications involving updates, such as read-write file sharing, directory services, online ...
Sai Susarla, John B. Carter
ICEIS
2005
IEEE
14 years 3 months ago
COCO: Composition Model and Composition Model Implementation
Component-based software engineering attempts to address the ever increasing demand for new software applications by enabling a compositional approach to software construction in ...
Naiyana Tansalarak, Kajal T. Claypool
« Prev « First page 2633 / 2724 Last » Next »