Sciweavers

890 search results - page 115 / 178
» Programming language methods in computer security
Sort
View
ASPLOS
2012
ACM
13 years 8 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
121
Voted
SIGGRAPH
1993
ACM
15 years 4 months ago
Global visibility algorithms for illumination computations
The most expensive geometric operation in image synthesis is visibility determination. Classically this is solved with hidden surface removal algorithms that render only the parts...
Seth J. Teller, Pat Hanrahan
92
Voted
ECBS
1996
IEEE
93views Hardware» more  ECBS 1996»
15 years 4 months ago
A Methodology for Designing and Dimensioning Critical Complex Computing Systems
It is widely recognized that real-time,fault-tolerant and distributed computing technologies play a key role in the deployment of many current andfuture (civilian or Defense) crit...
Gérard Le Lann
160
Voted

Book
323views
16 years 10 months ago
Adaptive Object-Oriented Software: a PWS book
"This book introduces a software development method, called the Demeter Method, for developing adaptive object-oriented software. The reader will learn the Demeter Method for...
Karl J. Lieberherr
86
Voted
IFIP
2003
Springer
15 years 5 months ago
Soft Output Bit Error Rate Estimation for WCDMA
This paper introduces a method that computes an estimation of the bit error rate (BER) based on the RAKE receiver soft output only. For this method no knowledge is needed about the...
Lodewijk T. Smit, Gerard J. M. Smit, Johann Hurink...