Sciweavers

10899 search results - page 2055 / 2180
» Wide Area Computation
Sort
View
ISI
2005
Springer
15 years 10 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
SAT
2005
Springer
129views Hardware» more  SAT 2005»
15 years 10 months ago
On Finding All Minimally Unsatisfiable Subformulas
Much attention has been given in recent years to the problem of finding Minimally Unsatisfiable Subformulas (MUSes) of Boolean formulas. In this paper, we present a new view of the...
Mark H. Liffiton, Karem A. Sakallah
STORYTELLING
2005
Springer
15 years 10 months ago
Formal Encoding of Drama Ontology
The goal of this research is to lay the foundations for a formal theory , that abstracts from the procedural and interactive aspects involved in the generation of dramatic content....
Rossana Damiano, Vincenzo Lombardo, Antonio Pizzo
CASES
2004
ACM
15 years 10 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
COMPGEOM
2004
ACM
15 years 10 months ago
Single-strip triangulation of manifolds with arbitrary topology
Triangle strips have been widely used for efficient rendering. It is NP-complete to test whether a given triangulated model can be represented as a single triangle strip, so many...
David Eppstein, M. Gopi
« Prev « First page 2055 / 2180 Last » Next »