Sciweavers

683 search results - page 111 / 137
» Four Types of Lookback
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 3 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
GLVLSI
2005
IEEE
144views VLSI» more  GLVLSI 2005»
15 years 3 months ago
On-chip power distribution grids with multiple supply voltages for high performance integrated circuits
—On-chip power distribution grids with multiple supply voltages are discussed in this paper. Two types of interdigitated and paired power distribution grids with multiple supply ...
Mikhail Popovich, Eby G. Friedman, Michael Sotman,...
DIGRA
2005
Springer
15 years 3 months ago
Theory as Game: Designing the Game Game
Is there a way to analyze games by the means of a game? Is there a way to brainstorm game ideas and design solutions through theory? Finnish scholar and game designer Aki Järvine...
Aki Järvinen
SIGIR
2004
ACM
15 years 3 months ago
An effective approach to document retrieval via utilizing WordNet and recognizing phrases
Noun phrases in queries are identified and classified into four types: proper names, dictionary phrases, simple phrases and complex phrases. A document has a phrase if all content...
Shuang Liu, Fang Liu, Clement T. Yu, Weiyi Meng
ACRI
2004
Springer
15 years 3 months ago
Optimizing the Behavior of a Moving Creature in Software and in Hardware
We have investigated a problem where the goal is to find automatically the best rule for a cell in the cellular automata model. The cells are either of type OBSTACLE, EMPTY or CRE...
Mathias Halbach, Wolfgang Heenes, Rolf Hoffmann, J...