Sciweavers

27756 search results - page 5382 / 5552
» Process Query Systems
Sort
View
110
Voted
TOG
2008
122views more  TOG 2008»
15 years 2 months ago
Time-resolved 3d capture of non-stationary gas flows
Fluid simulation is one of the most active research areas in computer graphics. However, it remains difficult to obtain measurements of real fluid flows for validation of the simu...
Bradley Atcheson, Ivo Ihrke, Wolfgang Heidrich, Ar...
128
Voted
TON
2008
155views more  TON 2008»
15 years 2 months ago
A comparative analysis of server selection in content replication networks
Server selection plays an essential role in content replication networks, such as peer-to-peer (P2P) and content delivery networks (CDNs). In this paper, we perform an analytical i...
Tao Wu, David Starobinski
TOPLAS
2008
138views more  TOPLAS 2008»
15 years 2 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
136
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 2 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
116
Voted
JSS
2007
115views more  JSS 2007»
15 years 2 months ago
A case study in re-engineering to enforce architectural control flow and data sharing
Without rigorous software development and maintenance, software tends to lose its original architectural structure and become difficult to understand and modify. ArchJava, a recen...
Marwan Abi-Antoun, Jonathan Aldrich, Wesley Coelho
« Prev « First page 5382 / 5552 Last » Next »