Sciweavers

4081 search results - page 725 / 817
» The Impact of Constraint Programming
Sort
View
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 5 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
VR
2003
IEEE
163views Virtual Reality» more  VR 2003»
15 years 5 months ago
Ribbon Networks for Modeling Navigable Paths of Autonomous Agents in Virtual Urban Environments
This paper presents a real-time database modeling complex networks of intersecting roads and walkways in urban virtual environments. The database represents information about the ...
Peter Willemsen, Joseph K. Kearney, Hongling Wang
112
Voted
MM
2003
ACM
205views Multimedia» more  MM 2003»
15 years 5 months ago
AVE: automated home video editing
In this paper, we present a system that automates home video editing. This system automatically extracts a set of highlight segments from a set of raw home videos and aligns them ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang
ATAL
2003
Springer
15 years 5 months ago
Process Algebra for Agent Communication: A General Semantic Approach
Abstract. In this paper, we consider the process algebra ACPL, which models the basics of agent communication. This algebra combines the informationprocessing aspects of Concurrent...
Rogier M. van Eijk, Frank S. de Boer, Wiebe van de...
CC
2003
Springer
15 years 5 months ago
Early Control of Register Pressure for Software Pipelined Loops
Abstract. The register allocation in loops is generally performed after or during the software pipelining process. This is because doing a conventional register allocation at firs...
Sid Ahmed Ali Touati, Christine Eisenbeis