Sciweavers

385 search results - page 54 / 77
» constraints 1999
Sort
View
SMA
2006
ACM
121views Solid Modeling» more  SMA 2006»
14 years 1 months ago
Duplicate-skins for compatible mesh modelling
As compatible meshes play important roles in many computeraided design applications, we present a new approach for modelling compatible meshes. Our compatible mesh modelling metho...
Yu Wang, Charlie C. L. Wang, Matthew Ming-Fai Yuen
RECOMB
2001
Springer
14 years 3 days ago
Edit distance between two RNA structures
The primary structure of a ribonucleic acid (RNA) molecule is a sequence of nucleotides (bases) over the four-letter alphabet fA; C; G; Ug. The secondary or tertiary structure of ...
Guohui Lin, Bin Ma, Kaizhong Zhang
ACSAC
1999
IEEE
14 years 15 hour ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
ACSAC
1999
IEEE
14 years 15 hour ago
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning
This paper discusses the Address Resolution Protocol (ARP) and the problem of ARP cache poisoning. ARP cache poisoning is the malicious act, by a host in a LAN, of introducing a s...
Mahesh V. Tripunitara, Partha Dutta
AGP
1999
IEEE
14 years 15 hour ago
Widening Sharing
We study the problem of an efficient and precise sharing analysis of (constraint) logic programs. After recognizing that neither aring nor its non-redundant (but equivalent) abstra...
Enea Zaffanella, Roberto Bagnara, Patricia M. Hill