Sciweavers

4498 search results - page 177 / 900
» How to Invent Functions
Sort
View
ESORICS
2003
Springer
15 years 9 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
VISUALIZATION
1998
IEEE
15 years 8 months ago
Visualization for multiparameter aircraft designs
We describe an aircraft design problem in high dimensional space, with D typically being 10 to 30. In some respects this is a classic optimization problem, where the goal is to fi...
Clifford A. Shaffer, Duane L. Knill, Layne T. Wats...
SAS
1993
Springer
139views Formal Methods» more  SAS 1993»
15 years 8 months ago
Compiling FX on the CM-2
Type and effect systems provide a safe and effective means of programming high-performance parallel computers with a high-level language that integrates both functional and impe...
Jean-Pierre Talpin, Pierre Jouvelot
ADBIS
2010
Springer
136views Database» more  ADBIS 2010»
15 years 5 months ago
New Frontiers in Business Intelligence: Distribution and Personalization
Abstract. To meet the new, more sophisticated needs of decision makers, a new generation of BI systems is emerging. In this paper we focus on two enabling technologies for this new...
Stefano Rizzi
CORR
2010
Springer
156views Education» more  CORR 2010»
15 years 4 months ago
Building Reusable Software Component For Optimization Check in ABAP Coding
Software component reuse is the software engineering practice of developing new software products from existing components. A reuse library or component reuse repository organizes...
P. Shireesha, S. S. V. N. Sharma