Sciweavers

1927 search results - page 383 / 386
» An Access Control Model for Location based Services
Sort
View
IPPS
2008
IEEE
14 years 22 days ago
Wait-free Programming for General Purpose Computations on Graphics Processors
The fact that graphics processors (GPUs) are today’s most powerful computational hardware for the dollar has motivated researchers to utilize the ubiquitous and powerful GPUs fo...
Phuong Hoai Ha, Philippas Tsigas, Otto J. Anshus
ACSAC
2007
IEEE
14 years 20 days ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
ESWS
2007
Springer
14 years 14 days ago
Annotating Relationships Between Multiple Mixed-Media Digital Objects by Extending Annotea
Annotea provides an annotation protocol to support collaborative Semantic Web-based annotation of digital resources accessible through the Web. It provides a model whereby a user m...
Ronald Schroeter, Jane Hunter, Andrew Newman
EGH
2003
Springer
13 years 11 months ago
Automatic shader level of detail
Current graphics hardware can render procedurally shaded objects in real-time. However, due to resource and performance limitations, interactive shaders can not yet approach the c...
Marc Olano, Bob Kuehne, Maryann Simmons
HYBRID
2010
Springer
13 years 11 months ago
Safe compositional network sketches: formal framework
NetSketch is a tool for the specification of constrained-flow applications and the certification of desirable safety properties imposed thereon. NetSketch assists system integr...
Azer Bestavros, Assaf J. Kfoury, Andrei Lapets, Mi...