Sciweavers

5344 search results - page 881 / 1069
» Privacy-Preserving Set Operations
Sort
View
140
Voted
ECOOP
2005
Springer
15 years 9 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
146
Voted
FOSSACS
2005
Springer
15 years 9 months ago
Mathematical Models of Computational and Combinatorial Structures
The general aim of this talk is to advocate a combinatorial perspective, together with its methods, in the investigation and study of models of computation structures. This, of cou...
Marcelo P. Fiore
136
Voted
GECCO
2005
Springer
155views Optimization» more  GECCO 2005»
15 years 9 months ago
Mission planning for joint suppression of enemy air defenses using a genetic algorithm
In this paper we present a genetic algorithm applied to the problem of mission planning for Joint Suppression of Enemy Air Defenses (JSEAD) in support of air strike operations. Th...
Jeffrey P. Ridder, Jason C. HandUber
144
Voted
IVA
2005
Springer
15 years 9 months ago
A Platform Independent Architecture for Virtual Characters and Avatars
this is via the ”Motion Abstraction”. This is a single abstraction that represents any type of animation of a character. Different implementations of the ion can provide very ...
M. Gillies, Vinoba Vinayagamoorthy, D. Robeterson,...
122
Voted
MLCW
2005
Springer
15 years 9 months ago
Evaluating Predictive Uncertainty Challenge
This Chapter presents the PASCAL1 Evaluating Predictive Uncertainty Challenge, introduces the contributed Chapters by the participants who obtained outstanding results, and provide...
Joaquin Quiñonero Candela, Carl Edward Rasm...