Sciweavers

9387 search results - page 1853 / 1878
» An Optimal Process Model for a Real Time Process
Sort
View
ICS
2000
Tsinghua U.
15 years 3 months ago
Push vs. pull: data movement for linked data structures
As the performance gap between the CPU and main memory continues to grow, techniques to hide memory latency are essential to deliver a high performance computer system. Prefetchin...
Chia-Lin Yang, Alvin R. Lebeck
SIGGRAPH
1995
ACM
15 years 2 months ago
Feature-based volume metamorphosis
Image metamorphosis, or image morphing, is a popular technique for creating a smooth transition between two images. For synthetic images, transforming and rendering the underlying...
Apostolos Lerios, Chase D. Garfinkle, Marc Levoy
BMCBI
2006
111views more  BMCBI 2006»
14 years 11 months ago
High throughput profile-profile based fold recognition for the entire human proteome
Background: In order to maintain the most comprehensive structural annotation databases we must carry out regular updates for each proteome using the latest profile-profile fold r...
Liam J. McGuffin, Richard T. Smith, Kevin Bryson, ...
PRESENCE
2000
92views more  PRESENCE 2000»
14 years 11 months ago
Virtual Explorer: Interactive Virtual Environment for Education
The Virtual Explorer project of the Senses Bureau at the University of California, San Diego, focuses on creating immersive, highly interactive environments for education and scie...
Kevin L. Dean, Xyler S. Asay-Davis, Evan M. Finn, ...
ESEM
2010
ACM
14 years 10 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
« Prev « First page 1853 / 1878 Last » Next »