Sciweavers

298 search results - page 1 / 60
» Computer security: quality rather than quantity
Sort
View
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 4 months ago
Locating phase transitions in computationally hard problems
We discuss how phase-transitions may be detected in computationally hard problems in the context of anytime algorithms. Treating the computational time, value and utility functions...
B. Ashok, T. K. Patra
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
13 years 11 months ago
Fine-Tuning the Human-Computer Interface: Verbal versus Keyboard Input in an Idea Generation Context
Voice recognition technologies are rapidly evolving to help humans interact with computers more efficiently and effectively. Despite their potential advantages, their impact on sy...
Jay J. H. Jung, Clayton A. Looney, Joseph S. Valac...
IEEEIAS
2007
IEEE
13 years 11 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
TVCG
2008
92views more  TVCG 2008»
13 years 4 months ago
High-Quality Rendering of Quartic Spline Surfaces on the GPU
Abstract-- We present a novel GPU-based algorithm for highquality rendering of bivariate spline surfaces. An essential difference to the known methods for rendering graph surfaces ...
Gerd Reis, Frank Zeilfelder, Martin Hering-Bertram...