Sciweavers

406 search results - page 38 / 82
» PASSing the provenance challenge
Sort
View
VIS
2008
IEEE
134views Visualization» more  VIS 2008»
15 years 11 months ago
A Practical Approach to Morse-Smale Complex Computation: Scalability and Generality
The Morse-Smale (MS) complex has proven to be a useful tool in extracting and visualizing features from scalar-valued data. However, efficient computation of the MS complex for lar...
Attila Gyulassy, Peer-Timo Bremer, Bernd Hamann,...
ICFP
2006
ACM
15 years 9 months ago
An object-oriented approach to datatype-generic programming
Datatype-generic programming (DGP) is the next step beyond abstracting over types using parametric polymorphism, which is often called "genericity" in object-oriented la...
Adriaan Moors, Frank Piessens, Wouter Joosen
MOBISYS
2003
ACM
15 years 9 months ago
Tactics-Based Remote Execution for Mobile Computing
Remote execution can transform the puniest mobile device into a computing giant able to run resource-intensive applications such as natural language translation, speech recognitio...
Rajesh Krishna Balan, Mahadev Satyanarayanan, SoYo...
73
Voted
EUROGRAPHICS
2010
Eurographics
15 years 6 months ago
Synthesis of Responsive Motion Using a Dynamic Model
Synthesizing the movements of a responsive virtual character in the event of unexpected perturbations has proven a difficult challenge. To solve this problem, we devise a fully a...
Yuting Ye and C. Karen Liu
98
Voted
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
15 years 6 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters