Sciweavers

6149 search results - page 1054 / 1230
» Revealing the programming process
Sort
View
ACSAC
2006
IEEE
15 years 11 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toyâ...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
ACSC
2006
IEEE
15 years 11 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
CGI
2006
IEEE
15 years 11 months ago
Quasi-physical Simulation of Large-Scale Dynamic Forest Scenes
This paper presents a quasi-physically based approach for interactively simulating large-scale dynamic forest scenes under different wind conditions. We introduce theories from th...
Long Zhang, Chengfang Song, Qifeng Tan, Wei Chen, ...
CGO
2006
IEEE
15 years 11 months ago
Constructing Virtual Architectures on a Tiled Processor
As the amount of available silicon resources on one chip increases, we have seen the advent of ever increasing parallel resources integrated on-chip. Many architectures use these ...
David Wentzlaff, Anant Agarwal
CRV
2006
IEEE
90views Robotics» more  CRV 2006»
15 years 11 months ago
Photo Hull Regularized Stereo
A regularization-based approach to 3-D reconstruction from multiple images is proposed. As one of the most widely used multiple-view 3-D reconstruction algorithms, Space Carving c...
Shufei Fan, Frank P. Ferrie
« Prev « First page 1054 / 1230 Last » Next »