Sciweavers

26354 search results - page 5097 / 5271
» How we refactor, and how we know it
Sort
View
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
ECAI
2000
Springer
15 years 6 months ago
An Embedding of ConGolog in 3APL
Several high-level programming languages for programming agents and robots have been proposed in recent years. Each of these languages has its own features and merits. It is still...
Koen V. Hindriks, Yves Lespérance, Hector J...
ICFP
1999
ACM
15 years 6 months ago
Type Inference Builds a Short Cut to Deforestation
Deforestation optimises a functional program by transforming it into another one that does not create certain intermediate data structures. Short cut deforestation is a deforestat...
Olaf Chitil
SIGGRAPH
1999
ACM
15 years 6 months ago
Environment Matting and Compositing
This paper introduces a new process, environment matting, which captures not just a foreground object and its traditional opacity matte from a real-world scene, but also a descrip...
Douglas E. Zongker, Dawn M. Werner, Brian Curless,...
90
Voted
SMA
1999
ACM
100views Solid Modeling» more  SMA 1999»
15 years 6 months ago
Matchmaker: manifold BReps for non-manifold r-sets
Many solid modeling construction techniques produce non-manifold r-sets (solids). With each non-manifold model N we can associate a family of manifold solid models that are infini...
Jarek Rossignac, David E. Cardoze
« Prev « First page 5097 / 5271 Last » Next »