Sciweavers

8655 search results - page 1574 / 1731
» Challenges for Trusted Computing
Sort
View
100
Voted
CACM
2008
101views more  CACM 2008»
14 years 10 months ago
Just say 'A Class Defines a Data Type'
data type and (Java) class, asking about the relationship between them. The same students would also be unlikely to find an answer in a CS1 textbook. Some textbooks might not even ...
Chenglie Hu
CGF
2008
157views more  CGF 2008»
14 years 10 months ago
Interactive Volume Rendering with Dynamic Ambient Occlusion and Color Bleeding
We propose a method for rendering volumetric data sets at interactive frame rates while supporting dynamic ambient occlusion as well as an approximation to color bleeding. In cont...
Timo Ropinski, Jennis Meyer-Spradow, Stefan Diepen...
CORR
2010
Springer
108views Education» more  CORR 2010»
14 years 10 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
99
Voted
EOR
2010
88views more  EOR 2010»
14 years 10 months ago
Mathematical programming approaches for generating p-efficient points
Abstract: Probabilistically constrained problems, in which the random variables are finitely distributed, are nonconvex in general and hard to solve. The p-efficiency concept has b...
Miguel A. Lejeune, Nilay Noyan
ALGORITHMICA
2006
139views more  ALGORITHMICA 2006»
14 years 10 months ago
CONQUEST: A Coarse-Grained Algorithm for Constructing Summaries of Distributed Discrete Datasets
Abstract. In this paper we present a coarse-grained parallel algorithm, CONQUEST, for constructing boundederror summaries of high-dimensional binary attributed data in a distribute...
Jie Chi, Mehmet Koyutürk, Ananth Grama
« Prev « First page 1574 / 1731 Last » Next »