Sciweavers

11121 search results - page 1993 / 2225
» Computing with Continuous Change
Sort
View
131
Voted
CLEIEJ
1998
134views more  CLEIEJ 1998»
15 years 3 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
IJCV
1998
101views more  IJCV 1998»
15 years 3 months ago
Synthesis of Novel Views from a Single Face Image
Images formed by a human face change with viewpoint. A new technique is described for synthesizing images of faces from new viewpoints, when only a single 2D image is available. A...
Thomas Vetter
JCT
2002
107views more  JCT 2002»
15 years 3 months ago
Asymmetric Binary Covering Codes
An asymmetric binary covering code of length n and radius R is a subset C of the n-cube Qn such that every vector x Qn can be obtained from some vector c C by changing at most R...
Joshua N. Cooper, Robert B. Ellis, Andrew B. Kahng
146
Voted
DKE
1999
118views more  DKE 1999»
15 years 3 months ago
Designing Data Warehouses
A Data Warehouse DW is a database that collects and stores data from multiple remote and heterogeneous information sources. When a query is posed, it is evaluated locally, without...
Dimitri Theodoratos, Timos K. Sellis
NETWORKS
2002
15 years 3 months ago
Approximation algorithms for constructing wavelength routing networks
Consider a requirement graph whose vertices represent customers and an edge represents the need to route a unit of flow between its end vertices along a single path. All of these ...
Refael Hassin, Asaf Levin
« Prev « First page 1993 / 2225 Last » Next »