Sciweavers

3032 search results - page 508 / 607
» Complexity of sequences and dynamical systems
Sort
View
117
Voted
TOG
2012
258views Communications» more  TOG 2012»
13 years 3 months ago
Stitch meshes for modeling knitted clothing with yarn-level detail
ike abstraction of the yarn model; (c) then, we specify the desired knitting pattern over the stitch mesh’s surface. (d) Following the interactive modeling process, the model goe...
Cem Yuksel, Jonathan M. Kaldor, Doug L. James, Ste...
96
Voted
ACSAC
2006
IEEE
15 years 6 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
95
Voted
IPPS
1998
IEEE
15 years 5 months ago
Partial Rearrangements of Space-Shared FPGAs
Abstract Oliver Diessel1 and Hossam ElGindy2 1Department of Computer Science and Software Engineering 2Department of Electrical and Computer Engineering The University of Newcastle...
Oliver Diessel, Hossam A. ElGindy
ECCV
1994
Springer
15 years 4 months ago
Integration and Control of Reactive Visual Processes
This paper describes a new approach to the integration and control of continuously operating visual processes. Visual processes are expressed as transformations which map signals ...
James L. Crowley, Jean Marc Bedrune, Morten Bekker...
112
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 2 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...