Sciweavers

2208 search results - page 240 / 442
» Memory Practices in the Sciences
Sort
View
DIS
2010
Springer
14 years 9 months ago
ESTATE: Strategy for Exploring Labeled Spatial Datasets Using Association Analysis
Abstract. We propose an association analysis-based strategy for exploration of multi-attribute spatial datasets possessing naturally arising classification. Proposed strategy, EST...
Tomasz F. Stepinski, Josue Salazar, Wei Ding 0003,...
ACMSE
2010
ACM
14 years 9 months ago
Automatic generation of model traversals from metamodel definitions
Developing software from models is a growing practice and there exist many model-based tools (e.g., model editors, model interpreters) for supporting model-driven engineering. Eve...
Tomaz Lukman, Marjan Mernik, Zekai Demirezen, Barr...
CAINE
2010
14 years 9 months ago
Scrybe: A Tablet Interface for Virtual Environments
Virtual reality (VR) technology has the potential to provide unique perspectives of data that are not possible with standard desktop hardware. The tracking devices often found wit...
Roger V. Hoang, Joshua Hegie, Frederick C. Harris ...
TDSC
2011
14 years 6 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
TCOS
2010
14 years 5 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...