Sciweavers

6607 search results - page 1257 / 1322
» Making TeX Work
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
14 years 10 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CGF
2008
156views more  CGF 2008»
14 years 10 months ago
Render2MPEG: A Perception-based Framework Towards Integrating Rendering and Video Compression
Currently 3D animation rendering and video compression are completely independent processes even if rendered frames are streamed on-the-fly within a client-server platform. In suc...
Robert Herzog, Shin-ichi Kinuwaki, Karol Myszkowsk...
CGF
2008
131views more  CGF 2008»
14 years 10 months ago
Peek-in-the-Pic: Flying Through Architectural Scenes From a Single Image
Many casually taken "tourist" photographs comprise of architectural objects like houses, buildings, etc. Reconstructing such 3D scenes captured in a single photograph is...
Amit Shesh, Baoquan Chen
CORR
2010
Springer
208views Education» more  CORR 2010»
14 years 10 months ago
Bounded Model Checking of Multi-threaded Software using SMT solvers
The transition from single-core to multi-core processors has made multi-threaded software an important subject in computer aided verification. Here, we describe and evaluate an ex...
Lucas Cordeiro, Bernd Fischer 0002
CORR
2010
Springer
205views Education» more  CORR 2010»
14 years 10 months ago
Behavioral Simulations in MapReduce
In many scientific domains, researchers are turning to large-scale behavioral simulations to better understand real-world phenomena. While there has been a great deal of work on s...
Guozhang Wang, Marcos Antonio Vaz Salles, Benjamin...
« Prev « First page 1257 / 1322 Last » Next »