Sciweavers

3521 search results - page 341 / 705
» Algorithmic Control in Concurrent Computations
Sort
View
113
Voted
CIE
2007
Springer
15 years 11 months ago
Characterizing Programming Systems Allowing Program Self-reference
The interest is in characterizing insightfully the power of program self-reference in effective programming systems (epses), the computability-theoretic analogs of programming lan...
John Case, Samuel E. Moelius
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
15 years 9 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
RTSS
2008
IEEE
15 years 11 months ago
Priority Assignment for Real-Time Wormhole Communication in On-Chip Networks
—Wormhole switching with fixed priority preemption has been proposed as a possible solution for real-time on-chip communication. However, none of current priority assignment pol...
Zheng Shi, Alan Burns
ICRA
2002
IEEE
146views Robotics» more  ICRA 2002»
15 years 9 months ago
Real-Time Combinatorial Tracking of a Target Moving Unpredictably among Obstacles
Abstract—Many applications require continuous monitoring of a moving target by a controllable vision system. Although the goal of tracking objects is not new, traditional techniq...
Héctor H. González-Baños, Che...
164
Voted
CG
2007
Springer
15 years 4 months ago
Subdivision surface watermarking
This paper presents a robust non-blind watermarking scheme for subdivision surfaces. The algorithm works in the frequency domain, by modulating spectral coefficients of the subdi...
Guillaume Lavoué, Florence Denis, Florent D...