Sciweavers

373 search results - page 59 / 75
» A New Approach for Image-Content Adaptive Mesh Generation
Sort
View
CEAS
2008
Springer
14 years 11 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
GI
2004
Springer
15 years 3 months ago
Realtime Ray Tracing for Current and Future Games
: Recently, realtime ray tracing has been developed to the point where it is becoming a possible alternative to the current rasterization approach for interactive 3D graphics. With...
Jörg Schmittler, Daniel Pohl, Tim Dahmen, Chr...
68
Voted
TOG
2002
96views more  TOG 2002»
14 years 9 months ago
Robust epsilon visibility
Analytic visibility algorithms, for example methods which compute a subdivided mesh to represent shadows, are notoriously unrobust and hard to use in practice. We present a new me...
Florent Duguet, George Drettakis
SASO
2008
IEEE
15 years 4 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
SERP
2008
14 years 11 months ago
Mapping Data-Flow Dependencies onto Distributed Embedded Systems
Model-driven development (MDD) is an emerging paradigm and has become state-of-the-art for embedded systems software design. In the overall design process, several steps have to be...
Stefan Kugele, Wolfgang Haberl