Sciweavers

1234 search results - page 213 / 247
» Privacy-preserving Virtual Machine
Sort
View
VCIP
2000
124views Communications» more  VCIP 2000»
15 years 1 months ago
Rendering of 3D-wavelet-compressed concentric mosaic scenery with progressive inverse wavelet synthesis (PIWS)
The concentric mosaics offer a quick solution to the construction and navigation of a virtual environment. To reduce the vast data amount of the concentric mosaics, a compression ...
Yunnan Wu, Lin Luo, Jin Li, Ya-Qin Zhang
JTRES
2010
ACM
14 years 12 months ago
Exhaustive testing of safety critical Java
With traditional testing, the test case has no control over non-deterministic scheduling decisions, and thus errors dependent on scheduling are only found by pure chance. Java Pat...
Tomás Kalibera, Pavel Parizek, Michal Maloh...
104
Voted
SIGCOMM
2010
ACM
14 years 12 months ago
QuagFlow: partnering Quagga with OpenFlow
Computing history has shown that open, multi-layer hardware and software stacks encourage innovation and bring costs down. Only recently this trend is meeting the networking world...
Marcelo Ribeiro Nascimento, Christian Esteve Rothe...
CORR
2008
Springer
105views Education» more  CORR 2008»
14 years 11 months ago
Integrating OPC Data into GSN Infrastructures
This paper presents the design and the implementation of an interface software component between OLE for Process Control (OPC) formatted data and the Global ...
Olivier Passalacqua, Eric Benoit, Marc-Philippe Hu...
ENTCS
2006
104views more  ENTCS 2006»
14 years 11 months ago
Using Bytecode Instruction Counting as Portable CPU Consumption Metric
Accounting for the CPU consumption of applications is crucial for software development to detect and remove performance bottlenecks (profiling) and to evaluate the performance of ...
Walter Binder, Jarle Hulaas