Sciweavers

1804 search results - page 352 / 361
» On set systems with a threshold property
Sort
View
ISSRE
2000
IEEE
15 years 4 months ago
Building Trust into OO Components Using a Genetic Analogy
Despite the growing interest for component-based systems, few works tackle the question of the trust we can bring into a component. This paper presents a method and a tool for bui...
Benoit Baudry, Vu Le Hanh, Jean-Marc Jéz&ea...
103
Voted
PG
2000
IEEE
15 years 4 months ago
Dynamic PDE Surfaces with Flexible and General Geometric Constraints
PDE surfaces, whose behavior is governed by Partial Differential Equations (PDEs), have demonstrated many modeling advantages in surface blending, free-form surface modeling, and ...
Haixia Du, Hong Qin
ACMICEC
2007
ACM
115views ECommerce» more  ACMICEC 2007»
15 years 3 months ago
An economic model of portal competition under privacy concerns
Due to inherent privacy concerns, online personalization services such as those offered through toolbars and desktop widgets are characterized by "no-free-disposal" (NFD...
Ramnath K. Chellappa, Raymond G. Sin
MPC
2010
Springer
174views Mathematics» more  MPC 2010»
15 years 3 months ago
Matrices as Arrows!
cting programs and point-free abstraction [2]. In order to automatically generate the fast running code there was the need to use matrix product as the basic matrix composition ope...
Hugo Daniel Macedo, José Nuno Oliveira
CONEXT
2007
ACM
15 years 3 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...