Sciweavers

15253 search results - page 2815 / 3051
» Integer-Programming Software Systems
Sort
View
93
Voted
SIGADA
1998
Springer
15 years 7 months ago
Looking into Safety with the Safety and Security Rapporteur Group
The requirements of High Integrity safety-critical, secure and mission-critical Software force developers to use specialised development techniques. Often the choice of computer l...
Stephen Michell, Mark Saaltink, Brian A. Wichmann
151
Voted
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 7 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
CHI
1997
ACM
15 years 7 months ago
A Prototype Design Tool for Participants in Graphical Multiuser Environments
d in Extended Abstracts, Human Factors in Computing Systems (CHI conference proceedings), Association for Computing Machinery, 1997, pp. 246-247. Originally appeared as Working Pap...
Carol Strohecker, Barbara Barros
122
Voted
SIGGRAPH
1997
ACM
15 years 7 months ago
Fake fur rendering
A probabilistic lighting model is presented for thin coats of fur over skin. Previous methods for rendering furry objects and creatures have addressed the case where individual st...
Dan B. Goldman
118
Voted
AGENTS
1997
Springer
15 years 7 months ago
Designing Behaviors for Information Agents
To facilitate the rapid development and open system interoperability of autonomous agents we need to carefully specify and effectively implement various classes of agent behaviors...
Keith Decker, Anandeep Pannu, Katia P. Sycara, Mik...
« Prev « First page 2815 / 3051 Last » Next »