Sciweavers

406 search results - page 38 / 82
» PASSing the provenance challenge
Sort
View
VIS
2008
IEEE
134views Visualization» more  VIS 2008»
16 years 2 months ago
A Practical Approach to Morse-Smale Complex Computation: Scalability and Generality
The Morse-Smale (MS) complex has proven to be a useful tool in extracting and visualizing features from scalar-valued data. However, efficient computation of the MS complex for lar...
Attila Gyulassy, Peer-Timo Bremer, Bernd Hamann,...
ICFP
2006
ACM
16 years 1 months ago
An object-oriented approach to datatype-generic programming
Datatype-generic programming (DGP) is the next step beyond abstracting over types using parametric polymorphism, which is often called "genericity" in object-oriented la...
Adriaan Moors, Frank Piessens, Wouter Joosen
MOBISYS
2003
ACM
16 years 1 months ago
Tactics-Based Remote Execution for Mobile Computing
Remote execution can transform the puniest mobile device into a computing giant able to run resource-intensive applications such as natural language translation, speech recognitio...
Rajesh Krishna Balan, Mahadev Satyanarayanan, SoYo...
EUROGRAPHICS
2010
Eurographics
15 years 10 months ago
Synthesis of Responsive Motion Using a Dynamic Model
Synthesizing the movements of a responsive virtual character in the event of unexpected perturbations has proven a difficult challenge. To solve this problem, we devise a fully a...
Yuting Ye and C. Karen Liu
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
15 years 10 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters