Sciweavers

961 search results - page 162 / 193
» Visual Cryptography on Graphs
Sort
View
IPPS
2000
IEEE
14 years 14 days ago
Bounded-Response-Time Self-Stabilizing OPS5 Production Systems
This paper examines the task of constructing boundedtime self-stabilizing rule-based systems that take their input from an external environment. Bounded response-time and self-sta...
Albert Mo Kim Cheng, Seiya Fujii
AGTIVE
2007
Springer
14 years 3 days ago
Generating Domain-Specific Model Editors with Complex Editing Commands
Abstract. Domain specific modeling languages are of increasing importance for the development of software and other systems. Meta tools are needed to support rapid development of d...
Gabriele Taentzer, André Crema, René...
ESCIENCE
2006
IEEE
13 years 11 months ago
Jylab: A System for Portable Scientific Computing over Distributed Platforms
Jylab is a portable and flexible scientific computing system favoring extensibility. It provides a user with a scripting language and a core set of libraries implementing numerica...
Giorgios Kollias, Efstratios Gallopoulos
AFRIGRAPH
2001
ACM
13 years 11 months ago
Real time isosurface browsing
: Cross-sectioning is a popular method for visualizing the complicated inner structures of three-dimensional volume datasets. However, the process is usually manual, meaning that a...
Caleb Lyness, Edwin H. Blake
APLAS
2001
ACM
13 years 11 months ago
Estimating Exception-Induced Control Flow for Java
Exception analyses so far cannot provide information on the propagation of thrown exceptions, which is necessary to construct interprocedural control flow graph, visualize exceptio...
Byeong-Mo Chang, Jang-Wu Jo