Sciweavers

1821 search results - page 262 / 365
» Security-Aware Program Transformations
Sort
View
107
Voted
SMA
2010
ACM
231views Solid Modeling» more  SMA 2010»
15 years 1 months ago
Conservative swept volume boundary approximation
We present a novel technique for approximating the boundary of a swept volume. The generator given by an input triangle mesh is rendered under all rigid transformations of a discr...
Andreas von Dziegielewski, R. Erbes, Elmar Sch&oum...
107
Voted
CORR
2010
Springer
198views Education» more  CORR 2010»
15 years 27 days ago
Space and the Synchronic A-Ram
Space is a spatial programming language designed to exploit the massive parallelism available in a formal model of computation called the Synchronic A-Ram, and physically related ...
Alexander Victor Berka
120
Voted
CORR
2010
Springer
97views Education» more  CORR 2010»
15 years 27 days ago
Continuation-Passing C, compiling threads to events through continuations
Abstract In this paper, we introduce Continuation Passing C (CPC), a programming language for concurrent systems in which native and cooperative threads are unified and presented t...
Gabriel Kerneis, Juliusz Chroboczek
189
Voted
ICDE
2008
IEEE
208views Database» more  ICDE 2008»
16 years 2 months ago
Clip: a Visual Language for Explicit Schema Mappings
Many data integration solutions in the market today include tools for schema mapping, to help users visually relate elements of different schemas. Schema elements are connected wit...
Alessandro Raffio, Daniele Braga, Mauricio A. Hern...
103
Voted
EUROGRAPHICS
2010
Eurographics
15 years 10 months ago
Rendering Wave Effects with Augmented Light Field
Ray–based representations can model complex light transport but are limited in modeling diffraction effects that require the simulation of wavefront propagation. This paper prov...
Se Baek Oh, Sriram Kashyap, Rohit Garg, Sharat Cha...