Sciweavers

1234 search results - page 214 / 247
» Privacy-preserving Virtual Machine
Sort
View
IJSWIS
2008
126views more  IJSWIS 2008»
14 years 11 months ago
Bringing Semantic Services to Real-World Objects
The last few years have seen the emergence of two parallel trends: the first of such trends is set by technologies such as Near Field Communication, 2D Bar codes and RFID that supp...
Massimo Paolucci, Gregor Broll, John Hamard, Enric...
JUCS
2008
117views more  JUCS 2008»
14 years 11 months ago
Eliminating Cycles in Weak Tables
: Weak References constitute an elegant mechanism for an application to interact with its garbage collector. In most of its typical uses, weak references are used through weak tabl...
Alexandra Barros, Roberto Ierusalimschy
ENTCS
2007
128views more  ENTCS 2007»
14 years 11 months ago
Optimisation Validation
We introduce the idea of optimisation validation, which is to formally establish that an instance of an optimising transformation indeed improves with respect to some resource mea...
David Aspinall, Lennart Beringer, Alberto Momiglia...
TAAS
2008
125views more  TAAS 2008»
14 years 11 months ago
Agile dynamic provisioning of multi-tier Internet applications
Dynamic capacity provisioning is a useful technique for handling the multi-time-scale variations seen in Internet workloads. In this paper, we propose a novel dynamic provisioning...
Bhuvan Urgaonkar, Prashant J. Shenoy, Abhishek Cha...
CGF
2004
106views more  CGF 2004»
14 years 11 months ago
High Quality Hatching
Hatching lines are often used in line illustrations to convey tone and texture of a surface. In this paper we present methods to generate hatching lines from polygonal meshes and ...
Johannes Zander, Tobias Isenberg, Stefan Schlechtw...