Sciweavers

6300 search results - page 209 / 1260
» We have it easy, but do we have it right
Sort
View
PEPM
2004
ACM
15 years 7 months ago
Declarative specialization for object-oriented-program specialization
The use of partial evaluation for specializing programs written in imperative languages such as C and Java is hampered by the difficulty of controlling the specialization process....
Helle Markmann Andersen, Ulrik Pagh Schultz
ICIDS
2009
Springer
15 years 6 months ago
Authoring Issues beyond Tools
Authoring is still considered a bottleneck in successful Interactive Storytelling and Drama. The claim for intuitive authoring tools is high, especially for tools that allow storyt...
Ulrike Spierling, Nicolas Szilas
WETICE
1998
IEEE
15 years 5 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
USENIX
2003
15 years 2 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
IJCV
2006
116views more  IJCV 2006»
15 years 1 months ago
Contextual Inference in Contour-Based Stereo Correspondence
Standard approaches to stereo correspondence have difficulty when scene structure does not lie in or near the frontal parallel plane, in part because an orientation disparity as we...
Gang Li, Steven W. Zucker