Sciweavers

1654 search results - page 290 / 331
» Comparing Two Software Design Process Theories
Sort
View
CHI
2005
ACM
15 years 10 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
CVPR
2010
IEEE
15 years 5 months ago
Hybrid Multi-view Reconstruction by Jump-Diffusion
We propose a multi-view stereo reconstruction algorithm which recovers urban scenes as a combination of meshes and geometric primitives. It provides a compact model while preservi...
Florent Lafarge, Renaud Keriven, Mathieu Bredif, H...
CSE
2009
IEEE
15 years 4 months ago
Information Flow and Search in Unstructured Keyword Based Social Networks
—In online social networks (OSNs), user connections can be represented as a network. The network formed has distinct properties that distinguish it from other network topologies....
Ankush Garg, Prantik Bhattacharyya, Charles U. Mar...
ASPDAC
2009
ACM
130views Hardware» more  ASPDAC 2009»
15 years 4 months ago
Analog placement with common centroid and 1-D symmetry constraints
— 1In this paper, we will present a placement method for analog circuits. We consider both common centroid and 1-D symmetry constraints, which are the two most common types of pl...
Linfu Xiao, Evangeline F. Y. Young
ICPP
2008
IEEE
15 years 4 months ago
XMT-GPU: A PRAM Architecture for Graphics Computation
The shading processors in graphics hardware are becoming increasingly general-purpose. We test, through simulation and benchmarking, the potential performance impact of replacing ...
Thomas M. DuBois, Bryant Lee, Yi Wang, Marc Olano,...