Sciweavers

24529 search results - page 4538 / 4906
» Computing on Authenticated Data
Sort
View
162
Voted
IJRR
2002
137views more  IJRR 2002»
15 years 4 months ago
Acquisition of Elastic Models for Interactive Simulation
We present method and implementation to acquire deformable models of elastic objects. The method is based on the Green's functions matrix representation of an elastic solid. ...
Jochen Lang, Dinesh K. Pai, Robert J. Woodham
CL
1999
Springer
15 years 4 months ago
Optimizing floating point operations in Scheme
It is well known that dynamic typing in languages like Lisp is costly in terms of performance. Besides the cost of tag checking, the other major source of ine ciency comes from th...
W. F. Wong
164
Voted
JBI
2002
128views Bioinformatics» more  JBI 2002»
15 years 4 months ago
Rutabaga by any other name: extracting biological names
i As the pace of biological research accelerates, biologists are becoming increasingly reliant on computers to manage the information explosion. Biologists communicate their resea...
Lynette Hirschman, Alexander A. Morgan, Alexander ...
154
Voted
IJON
1998
102views more  IJON 1998»
15 years 4 months ago
Developments of the generative topographic mapping
The Generative Topographic Mapping (GTM) model was introduced by 7) as a probabilistic re-formulation of the self-organizing map (SOM). It offers a number of advantages compared ...
Christopher M. Bishop, Markus Svensén, Chri...
CN
1999
156views more  CN 1999»
15 years 4 months ago
Virtual reality movies-real-time streaming of 3D objects
Powerful servers for computation and storage, high-speed networking resources, and high-performance 3D graphics workstation, which are typically available in scientific research e...
Stephan Olbrich, Helmut Pralle
« Prev « First page 4538 / 4906 Last » Next »