Sciweavers

4048 search results - page 670 / 810
» Design Science, Engineering Science and Requirements Enginee...
Sort
View
134
Voted
SIGGRAPH
1994
ACM
15 years 7 months ago
Generalization of Lambert's reflectance model
Lambert's model for body reflection is widely used in computer graphics. It is used extensively by rendering techniques such as radiosity and ray tracing. For several real-wo...
Michael Oren, Shree K. Nayar
159
Voted
CCS
2007
ACM
15 years 7 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
155
Voted
CF
2007
ACM
15 years 7 months ago
Parallel genomic sequence-search on a massively parallel system
In the life sciences, genomic databases for sequence search have been growing exponentially in size. As a result, faster sequencesearch algorithms to search these databases contin...
Oystein Thorsen, Brian E. Smith, Carlos P. Sosa, K...
125
Voted
ATAL
2006
Springer
15 years 7 months ago
Gradient field-based task assignment in an AGV transportation system
Assigning tasks to agents is complex, especially in highly dynamic environments. Typical protocol-based approaches for task assignment such as Contract Net have proven their value...
Danny Weyns, Nelis Boucké, Tom Holvoet
113
Voted
HICSS
1995
IEEE
90views Biometrics» more  HICSS 1995»
15 years 7 months ago
Connection management without retaining information
Managing a connection between two hosts in a network is an important service to provide in order to make the network useful for many applications. The two main subproblems are the...
Hagit Attiya, Shlomi Dolev, Jennifer L. Welch