Sciweavers

24529 search results - page 358 / 4906
» Computing on Authenticated Data
Sort
View
CMPB
2010
186views more  CMPB 2010»
15 years 4 months ago
GPU-based cone beam computed tomography
The use of cone beam computed tomography (CBCT) is growing in the clinical arena due to its ability to provide 3-D information during interventions, its high diagnostic quality (su...
Peter B. Noël, Alan M. Walczak, Jinhui Xu, Ja...
COLING
2010
14 years 11 months ago
Cloud Computing for Linguists
The system presented is a web application designed to aid linguistic research with data collection and online publishing. It is a service mainly for linguists and language experts...
Dorothee Beermann, Pavel Mihaylov

Lecture Notes
742views
17 years 2 months ago
Computer Systems Analysis
Comparing systems using measurement, simulation, and queueing models. Common mistakes and how to avoid them, selection of techniques and metrics, art of data presentation, summariz...
Raj Jain
SIGMOD
2009
ACM
168views Database» more  SIGMOD 2009»
16 years 4 months ago
Database research in computer games
This tutorial presents an overview of the data management issues faced by computer games today. While many games do not use databases directly, they still have to process large am...
Alan J. Demers, Johannes Gehrke, Christoph Koch, B...
IJCNN
2006
IEEE
15 years 10 months ago
Small-catchment flood forecasting and drainage network extraction using computational intelligence
— Forecast, detection and warning of severe weather and related hydro-geological risks is becoming one of the major issues for civil protection. The use of computational intellig...
Erika Coppola, Barbara Tomassetti, Marco Verdecchi...