Sciweavers

599 search results - page 116 / 120
» Type System for Specializing Polymorphism
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 5 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
TDSC
2010
119views more  TDSC 2010»
13 years 2 months ago
On the General Applicability of Instruction-Set Randomization
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to creat...
Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto,...
MICCAI
2005
Springer
14 years 8 months ago
Brain Surface Parameterization Using Riemann Surface Structure
Abstract. We develop a general approach that uses holomorphic 1forms to parameterize anatomical surfaces with complex (possibly branching) topology. Rather than evolve the surface ...
Yalin Wang, Xianfeng Gu, Kiralee M. Hayashi, Tony ...
ATAL
2009
Springer
14 years 2 months ago
Distributed constraint optimization with structured resource constraints
Distributed constraint optimization (DCOP) provides a framework for coordinated decision making by a team of agents. Often, during the decision making, capacity constraints on age...
Akshat Kumar, Boi Faltings, Adrian Petcu
ATAL
2009
Springer
14 years 2 months ago
Using rituals to express cultural differences in synthetic characters
There is currently an ongoing demand for richer Intelligent Virtual Environments (IVEs) populated with social intelligent agents. As a result, many agent architectures are taking ...
Samuel Mascarenhas, João Dias, Nuno Afonso,...