Sciweavers

3256 search results - page 566 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
CGF
2004
102views more  CGF 2004»
14 years 9 months ago
Real-time Light Animation
Light source animation is a particularly hard field of real-time global illumination algorithms since moving light sources result in drastic illumination changes and make coherenc...
Mateu Sbert, László Szécsi, L...
PVLDB
2008
105views more  PVLDB 2008»
14 years 9 months ago
Transaction time indexing with version compression
Immortal DB is a transaction time database system designed to enable high performance for temporal applications. It is built into a commercial database engine, Microsoft SQL Serve...
David B. Lomet, Mingsheng Hong, Rimma V. Nehme, Ru...
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 1 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
BIRTHDAY
2012
Springer
13 years 5 months ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...
DAC
2007
ACM
15 years 10 months ago
Energy-Aware Data Compression for Multi-Level Cell (MLC) Flash Memory
We discover significant value-dependent programming energy variations in multi-level cell (MLC) flash memories, and introduce an energy-aware data compression method that minimize...
Yongsoo Joo, Youngjin Cho, Donghwa Shin, Naehyuck ...