Sciweavers

7189 search results - page 467 / 1438
» Connecting Design with Code
Sort
View
133
Voted
ACMSE
2004
ACM
15 years 10 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
148
Voted
SRDS
1998
IEEE
15 years 9 months ago
Interactive Image Retrieval over the Internet
In the paper, an e cient image database system is developed. The most important features of the proposed system include compressed domain indexing, searching by using scalable fea...
Jozsef Vass, Jia Yao, Anupam Joshi, Kannappan Pala...
SIGGRAPH
1998
ACM
15 years 9 months ago
Interactive Multi-Resolution Modeling on Arbitrary Meshes
During the last years the concept of multi-resolution modeling has gained special attention in many fields of computer graphics and geometric modeling. In this paper we generaliz...
Leif Kobbelt, Swen Campagna, Jens Vorsatz, Hans-Pe...
168
Voted
CCGRID
2004
IEEE
15 years 8 months ago
Data durability in peer to peer storage systems
In this paper we present a quantitative study of data survival in peer to peer storage systems. We first recall two main redundancy mechanisms: replication and erasure codes, whic...
G. Utard, Antoine Vernois
141
Voted
ALENEX
2004
107views Algorithms» more  ALENEX 2004»
15 years 6 months ago
An Experimental Analysis of a Compact Graph Representation
In previous work we described a method for compactly representing graphs with small separators, which makes use of small separators, and presented preliminary experimental results...
Daniel K. Blandford, Guy E. Blelloch, Ian A. Kash