Sciweavers

18306 search results - page 3160 / 3662
» Algorithmics in Exponential Time
Sort
View
3DPVT
2002
IEEE
169views Visualization» more  3DPVT 2002»
15 years 9 months ago
Compression of Isosurfaces for Structured Volumes with Context Modelling
In many applications surfaces with a large number of primitives occur. Geometry compression reduces storage space and transmission time for such models. A special case is given by...
Dietmar Saupe, Jens-Peer Kuska
ACSAC
2002
IEEE
15 years 9 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
ACSC
2002
IEEE
15 years 9 months ago
Signature Extraction for Overlap Detection in Documents
Easy access to the Web has led to increased potential for students cheating on assignments by plagiarising others’ work. By the same token, Web-based tools offer the potential f...
Raphael A. Finkel, Arkady B. Zaslavsky, Kriszti&aa...
DATE
2002
IEEE
123views Hardware» more  DATE 2002»
15 years 9 months ago
False Path Elimination in Quasi-Static Scheduling
We have developed a technique to compute a Quasi Static Schedule of a concurrent specification for the software partition of an embedded system. Previous work did not take into a...
G. Arrigoni, L. Duchini, Claudio Passerone, Lucian...
DSN
2002
IEEE
15 years 9 months ago
Detecting Processor Hardware Faults by Means of Automatically Generated Virtual Duplex Systems
A virtual duplex system (VDS) can be used to increase safety without the use of structural redundancy on a single machine. If a deterministic program P is calculating a given func...
Markus Jochim
« Prev « First page 3160 / 3662 Last » Next »