Sciweavers

5722 search results - page 332 / 1145
» Security Function Interactions
Sort
View
112
Voted
ICMLA
2004
15 years 5 months ago
RAIN: data clustering using randomized interactions between data points
Abstract-- This paper introduces a generalization of the Gravitational Clustering Algorithm proposed by Gomez et all in [1]. First, it is extended in such a way that not only the G...
Jonatan Gómez, Olfa Nasraoui, Elizabeth Leo...
141
Voted
CONCUR
2009
Springer
15 years 1 months ago
On Convergence of Concurrent Systems under Regular Interactions
Convergence is often the key liveness property for distributed systems that interact with physical processes. Techniques for proving convergence (asymptotic stability) have been ex...
Pavithra Prabhakar, Sayan Mitra, Mahesh Viswanatha...
121
Voted
APSEC
2010
IEEE
14 years 10 months ago
Testing Inter-layer and Inter-task Interactions in RTES Applications
Abstract--Real-time embedded systems (RTESs) are becoming increasingly ubiquitous, controlling a wide variety of popular and safety-critical devices. Effective testing techniques c...
Ahyoung Sung, Witawas Srisa-an, Gregg Rothermel, T...
155
Voted
APVIS
2011
14 years 3 months ago
Full-resolution interactive CPU volume rendering with coherent BVH traversal
We present an efficient method for volume rendering by raycasting on the CPU. We employ coherent packet traversal of an implicit bounding volume hierarchy, heuristically pruned u...
Aaron Knoll, Sebastian Thelen, Ingo Wald, Charles ...
112
Voted
ICSOC
2005
Springer
15 years 9 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...