Sciweavers

1833 search results - page 74 / 367
» Mechanized Verification with Sharing
Sort
View
112
Voted
VRST
2000
ACM
15 years 5 months ago
Message caching for local and global resource optimization in shared virtual environments
The use of Shared Virtual Environments is growing in areas such as multi-player video games, military and industrial training, and collaborative design and engineering. At the sam...
Helmuth Trefftz, Ivan Marsic
104
Voted
MABS
2004
Springer
15 years 6 months ago
Simulation and Analysis of Shared Extended Mind
Some types of animals exploit patterns created in the environment as external mental states, thus obtaining an extension of their mind. In the case of social animals the creation a...
Tibor Bosse, Catholijn M. Jonker, Martijn C. Schut...
127
Voted
JDCTA
2010
250views more  JDCTA 2010»
14 years 7 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
95
Voted
APLAS
2009
ACM
15 years 7 months ago
A Fresh Look at Separation Algebras and Share Accounting
Separation Algebras serve as models of Separation Logics; Share Accounting allows reasoning about concurrent-read/exclusive-write resources in Separation Logic. In designing a Conc...
Robert Dockins, Aquinas Hobor, Andrew W. Appel
91
Voted
APPT
2007
Springer
15 years 7 months ago
Domain Level Page Sharing in Xen Virtual Machine Systems
The memory size limits the scalability of virtual machine systems. There have been some researches about sharing identical pages among guest systems to reduce memory usage. However...
Myeongjae Jeon, Euiseong Seo, Junghyun Kim, Joonwo...