Sciweavers

1237 search results - page 42 / 248
» Abstract shade trees
Sort
View
SCAM
2005
IEEE
15 years 10 months ago
Pointer Analysis for Source-to-Source Transformations
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantl...
Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. W...
WCRE
2000
IEEE
15 years 8 months ago
E/R Schema for the Datrix C/C++/Java Exchange Format
A SEF (software exchange format), such as GXL [6], TA [4] or RSF [7], is used to exchange data between tools that analyze software. Researchers at Bell Canada have specified the D...
Richard C. Holt, Ahmed E. Hassan, Bruno Laguë...
MACE
2009
Springer
278views Communications» more  MACE 2009»
15 years 11 months ago
Achieving High-Level Directives Using Strategy-Trees
Abstract. A strategy-tree provides a systematic approach to the evaluation of the effectiveness of deployed policy sets and a mechanism to dynamically alter policy sets (i.e., alt...
Bradley Simmons, Hanan Lutfiyya
ISVC
2005
Springer
15 years 10 months ago
Comparing Sphere-Tree Generators and Hierarchy Updates for Deformable Objects Collision Detection
Abstract. This paper presents a quantitative evaluation of the accuracy of different sphere-tree construction methods when they are used in deformable bodies. The methods evaluate...
M. Garcia, S. Bayona, Pablo Toharia, C. Mendoza
ACNS
2010
Springer
155views Cryptology» more  ACNS 2010»
15 years 7 months ago
Redactable Signatures for Tree-Structured Data: Definitions and Constructions
ded abstract of this paper appears in Applied Cryptography and Network Security
Christina Brzuska, Heike Busch, Özgür Da...