Sciweavers

416 search results - page 72 / 84
» Some new approaches for preventing software tampering
Sort
View
HPCN
1995
Springer
15 years 3 months ago
Discrete optimisation and real-world problems
In the global economy, proper organisation and planning of production and storage locations, transportation and scheduling are vital to retain the competitive edge of companies. Th...
Josef Kallrath, Anna Schreieck
RT
1995
Springer
15 years 3 months ago
Making Global Illumination User-friendly
Global illumination researchers tend to think in terms of mesh density and sampling frequency, and their software reflects this in its user interface. Advanced rendering systems a...
Gregory J. Ward
USS
2008
15 years 1 months ago
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...
WSCG
2004
145views more  WSCG 2004»
15 years 24 days ago
Introducing Sweep Features in Modeling with Subdivision Surfaces
In recent times, subdivision surfaces have been considered a powerful representation for shape design. They have been successfully introduced in character animation software packa...
Chiara Eva Catalano, Franca Giannini, Bianca Falci...
CLEF
2010
Springer
15 years 16 days ago
Building Strategies, a Year Later
Abstract. After participating in last year's CLEF IP (2009) evaluation benchmark, our scores were rather low. The CLEF IP 2010 PAC task enabled us to correct some experiments ...
Wouter Alink, Roberto Cornacchia, Arjen P. de Vrie...