Sciweavers

8636 search results - page 1319 / 1728
» How Developers Copy
Sort
View
161
Voted
SAFECOMP
1999
Springer
15 years 9 months ago
Hierarchically Performed Hazard Origin and Propagation Studies
Abstract. This paper introduces a new method for safety analysis called HiPHOPS (Hierarchically Performed Hazard Origin and Propagation Studies). HiP-HOPS originates from a number ...
Yiannis Papadopoulos, John A. McDermid
IPPS
1998
IEEE
15 years 9 months ago
A Molecular Quasi-Random Model of Computations Applied to Evaluate Collective Intelligence
The paper presents how the Random PROLOG Processor (RPP), a bio-inspired model of computations, can be used for formalization and analysis of a phenomenon - the Collective Intelli...
Tadeusz Szuba
COBUILD
1998
Springer
15 years 9 months ago
The Timeless Way: Making Living Cooperative Buildings with Design Patterns
Interfaces to information systems, and the buildings in which such systems are embedded will typically be the result of the work of a large number of different disciplines, potenti...
Lyn Pemberton, Richard N. Griffiths
152
Voted
POPL
1998
ACM
15 years 9 months ago
Secure Information Flow in a Multi-Threaded Imperative Language
Previously, we developed a type system to ensure secure information flow in a sequential, imperative programming language [VSI96]. Program variables are classified as either hig...
Geoffrey Smith, Dennis M. Volpano
SIGGRAPH
1998
ACM
15 years 9 months ago
A Distributed 3D Graphics Library
We present Repo-3D, a general-purpose, object-oriented library for developing distributed, interactive 3D graphics applications across a range of heterogeneous workstations. Repo-...
Blair MacIntyre, Steven Feiner
« Prev « First page 1319 / 1728 Last » Next »