Sciweavers

1124 search results - page 121 / 225
» Hidden Market Design
Sort
View
CAV
2010
Springer
153views Hardware» more  CAV 2010»
15 years 3 months ago
There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code
This paper discusses the obstacles that stand in the way of doing a good job of machine-code analysis. Compared with analysis of source code, the challenge is to drop all assumptio...
Thomas W. Reps, Junghee Lim, Aditya V. Thakur, Gog...
CGI
2001
IEEE
15 years 3 months ago
Using A-Buffer in Radiosity
Anti-aliasing in form factor computation and precise determination of shadow boundaries are important issiresfor Radiosity method. A-Buffer is a technique introduced by Carpenter ...
Q. Wang, J. H. Tang, C. H. Lim, H. C. Teh, Z. Y. H...
ICCE
2007
109views Education» more  ICCE 2007»
15 years 1 months ago
Information Sharing and Interaction in Collaborative Convergence
: In multiple research literatures, successful collaborative problem solving and learning is analyzed in terms of success of information sharing. In this paper we report analyses o...
Daniel D. Suthers, Ravikiran Vatrapu, Richard Medi...
FORTE
2004
15 years 1 months ago
Model-Checking Plus Testing: From Software Architecture Analysis to Code Testing
Software Model-Checking and Testing are some of the most used techniques to analyze software systems and identify hidden faults. While software model-checking allows for an exhaust...
Antonio Bucchiarone, Henry Muccini, Patrizio Pelli...
WSC
2004
15 years 1 months ago
The Hats Simulator
The Hats Simulator is designed to be a lightweight proxy for many intelligence analysis problems, and thus a test environment for analysts' tools. It is a virtual world in wh...
Paul R. Cohen, Clayton T. Morrison