Sciweavers

1173 search results - page 125 / 235
» Program Derivation Using Analogy
Sort
View
CGF
2007
112views more  CGF 2007»
15 years 5 months ago
Shape-aware Volume Illustration
We introduce a novel volume illustration technique for regularly sampled volume datasets. The fundamental difference between previous volume illustration algorithms and ours is th...
Wei Chen, Aidong Lu, David S. Ebert
JNS
2010
98views more  JNS 2010»
15 years 3 months ago
Analysis of a General Family of Regularized Navier-Stokes and MHD Models
ABSTRACT. We consider a general family of regularized Navier-Stokes and Magnetohydrodynamics (MHD) models on n-dimensional smooth compact Riemannian manifolds with or without bound...
Michael Holst, Evelyn Lunasin, Gantumur Tsogtgerel
262
Voted
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 8 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
122
Voted
KBSE
2008
IEEE
15 years 11 months ago
PtYasm: Software Model Checking with Proof Templates
—We describe PTYASM, an enhanced version of the YASM software model checker which uses proof templates. These templates associate correctness arguments with common programming id...
Thomas E. Hart, Kelvin Ku, Arie Gurfinkel, Marsha ...
ERLANG
2006
ACM
15 years 11 months ago
Evaluation of database management systems for Erlang
Erlang/OTP's DBMS Mnesia is lacking in several important areas to consider when implementing very large databases with massive scalability requirements. This article reveals ...
Emil Hellman