Sciweavers

6258 search results - page 1014 / 1252
» Applied Text Generation
Sort
View
ICCVW
1999
Springer
15 years 9 months ago
A General Method for Feature Matching and Model Extraction
Abstract. Popular algorithms for feature matching and model extraction fall into two broad categories, generate-and-test and Hough transform variations. However, both methods su er...
Clark F. Olson
HASE
1998
IEEE
15 years 9 months ago
Analytical Partition of Software Components for Evolvable and Reliable MEMS Design Tools
Transforming software requirements into a software design involves the iterative partition of a solution into software components. The process is human-intensive and does not guar...
Carol L. Hoover, Pradeep K. Khosla
IPPS
1998
IEEE
15 years 9 months ago
Compiler-Optimization of Implicit Reductions for Distributed Memory Multiprocessors
This paper presents reduction recognition and parallel code generationstrategies for distributed-memorymultiprocessors. We describe techniques to recognize a broad range of implic...
Bo Lu, John M. Mellor-Crummey
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 9 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
VISUALIZATION
1998
IEEE
15 years 9 months ago
Real-time techniques for 3D flow visualization
Visualization of three dimensional flow has to overcome a lot of problems to be effective. Among them are occlusion of distant details, lack of directional and depth hints and clu...
Anton L. Fuhrmann, Eduard Gröller
« Prev « First page 1014 / 1252 Last » Next »