Sciweavers

5722 search results - page 987 / 1145
» Security Function Interactions
Sort
View
129
Voted
IDMS
1999
Springer
117views Multimedia» more  IDMS 1999»
15 years 7 months ago
Tailoring Protocols for Dynamic Network Conditions and User Requirements
This paper shows the use of protocols dynamically generated for a particular network environment and an application’s requirements. We have developed a novel system called PNUT (...
R. De Silva, Aruna Seneviratne
PPDP
1999
Springer
15 years 7 months ago
Distributed Programming in a Multi-Paradigm Declarative Language
Curry is a multi-paradigm declarative language covering functional, logic, and concurrent programming paradigms. Curry’s operational semantics is based on lazy reduction of expre...
Michael Hanus
RT
1999
Springer
15 years 7 months ago
Decoupling Polygon Rendering from Geometry using Rasterization Hardware
The dramatically increasing size of polygonal models resulting from 3D scanning devices and advanced modeling techniques requires new approaches to reduce the load of geometry tran...
Rüdiger Westermann, Ove Sommer, Thomas Ertl
134
Voted
ISSTA
1998
ACM
15 years 7 months ago
Computation of Interprocedural Control Dependence
Program dependence information is useful for a variety of software testing and maintenance tasks. Properly defined, control and data dependencies can be used to identify semantic...
Mary Jean Harrold, Gregg Rothermel, Saurabh Sinha
PPSN
1998
Springer
15 years 7 months ago
On Genetic Algorithms and Lindenmayer Systems
This paper describes a system for simulating the evolution of artificial 2D plant morphologies. Virtual plant genotypes are inspired by the mathematical formalism known as Lindenma...
Gabriela Ochoa