Sciweavers

4564 search results - page 486 / 913
» Data Integration Using ID-Logic
Sort
View
WSCG
2003
151views more  WSCG 2003»
15 years 5 months ago
Large Model Visualization: Techniques and Applications
The visual representation of complex data has always been a major motivation for computer graphics. However, there have always been computer graphics scenes which were too complex...
Dirk Bartz
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
15 years 4 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
TSE
2008
113views more  TSE 2008»
15 years 3 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
138
Voted
TVCG
2010
217views more  TVCG 2010»
15 years 2 months ago
How Information Visualization Novices Construct Visualizations
—It remains challenging for information visualization novices to rapidly construct visualizations during exploratory data analysis. We conducted an exploratory laboratory study i...
Lars Grammel, Melanie Tory, Margaret-Anne D. Store...
TVCG
2012
184views Hardware» more  TVCG 2012»
13 years 6 months ago
Unified Boundary-Aware Texturing for Interactive Volume Rendering
—In this paper, we describe a novel approach for applying texture mapping to volumetric data sets. In contrast to previous approaches, the presented technique enables a unified i...
Timo Ropinski, Stefan Diepenbrock, Stefan Bruckner...