Sciweavers

2421 search results - page 333 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
IEAAIE
2001
Springer
15 years 9 months ago
A Mixed Closure-CSP Method to Solve Scheduling Problems
Scheduling problems can be seen as a set of temporal metric and disjunctive constraints. So, they can be formulated in terms of CSPs techniques. In the literature, there are CSP-b...
María Isabel Alfonso Galipienso, Federico B...
169
Voted
CCS
2011
ACM
14 years 4 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
DATE
2009
IEEE
114views Hardware» more  DATE 2009»
15 years 11 months ago
Hardware aging-based software metering
Abstract—Reliable and verifiable hardware, software and content usage metering (HSCM) are of primary importance for wide segments of e-commerce including intellectual property a...
Foad Dabiri, Miodrag Potkonjak
RT
2000
Springer
15 years 8 months ago
Fast Global Illumination Including Specular Effects
Rapidly simulating global illumination, including diffuse and glossy light transport is a very difficult problem. Finite element or radiosity approaches can achieve interactive si...
Xavier Granier, George Drettakis, Bruce Walter
COSIT
2007
Springer
136views GIS» more  COSIT 2007»
15 years 10 months ago
Spatial Semantics in Difference Spaces
Higher level semantics are considered useful in the geospatial domain, yet there is no general consensus on the form these semantics should take. Indeed, knowledge representation p...
Vlad Tanasescu