Sciweavers

151 search results - page 29 / 31
» Strong normalization from an unusual point of view
Sort
View
TGC
2007
Springer
14 years 11 days ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
CAV
2010
Springer
194views Hardware» more  CAV 2010»
13 years 10 months ago
LTSmin: Distributed and Symbolic Reachability
ions of ODE models (MAPLE, GNA). On the algorithmic side (Sec. 3.2), it supports two main streams in high-performance model checking: reachability analysis based on BDDs (symbolic)...
Stefan Blom, Jaco van de Pol, Michael Weber
ICWSM
2010
13 years 7 months ago
Who Acquires Friends Through Social Media and Why? "Rich Get Richer" Versus "Seek and Ye Shall Find"
There is an ongoing debate, not just among academics but in popular culture, about whether social media can expand people's social networks, and whether online friends can be...
Zeynep Tufekci
DAGSTUHL
2001
13 years 7 months ago
Visualization for the Mind's Eye
Software visualization has been almost exclusively tackled from the visual point of view; this means visualization occurs exclusively through the visual channel. This approach has ...
Nelson A. Baloian, Wolfram Luther

Book
9504views
15 years 4 months ago
The OpenGL Programming Guide - The Redbook
"The OpenGL Programming Guide, Fifth Edition, provides definitive and comprehensive information on OpenGL and the OpenGL Utility Library. The previous edition covered OpenGL t...
Dave Shreiner, Mason Woo, Jackie Neider, Tom Davis