Sciweavers

1734 search results - page 261 / 347
» its 2000
Sort
View
OOPSLA
2000
Springer
14 years 1 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski
PACS
2000
Springer
121views Hardware» more  PACS 2000»
14 years 1 months ago
Cache-Line Decay: A Mechanism to Reduce Cache Leakage Power
Reducing the supply voltage to reduce dynamic power consumption in CMOS devices, inadvertently will lead to an exponential increase in leakage power dissipation. In this work we ex...
Stefanos Kaxiras, Zhigang Hu, Girija J. Narlikar, ...
PAKDD
2000
ACM
128views Data Mining» more  PAKDD 2000»
14 years 1 months ago
Efficient Detection of Local Interactions in the Cascade Model
Detection of interactions among data items constitutes an essential part of knowledge discovery. The cascade model is a rule induction methodology using levelwise expansion of a la...
Takashi Okada
PG
2000
IEEE
14 years 1 months ago
Progressive Geometry Compression for Meshes
A novel progressive geometry compression scheme is presented in the paper. In this scheme a mesh is represented as a base mesh followed by some groups of vertex split operations us...
Xinguo Liu, Hujun Bao, Qunsheng Peng, Pheng-Ann He...
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 1 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval