Sciweavers

4048 search results - page 670 / 810
» Design Science, Engineering Science and Requirements Enginee...
Sort
View
112
Voted
SIGGRAPH
1994
ACM
15 years 4 months ago
Generalization of Lambert's reflectance model
Lambert's model for body reflection is widely used in computer graphics. It is used extensively by rendering techniques such as radiosity and ray tracing. For several real-wo...
Michael Oren, Shree K. Nayar
CCS
2007
ACM
15 years 4 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CF
2007
ACM
15 years 4 months ago
Parallel genomic sequence-search on a massively parallel system
In the life sciences, genomic databases for sequence search have been growing exponentially in size. As a result, faster sequencesearch algorithms to search these databases contin...
Oystein Thorsen, Brian E. Smith, Carlos P. Sosa, K...
100
Voted
ATAL
2006
Springer
15 years 4 months ago
Gradient field-based task assignment in an AGV transportation system
Assigning tasks to agents is complex, especially in highly dynamic environments. Typical protocol-based approaches for task assignment such as Contract Net have proven their value...
Danny Weyns, Nelis Boucké, Tom Holvoet
HICSS
1995
IEEE
90views Biometrics» more  HICSS 1995»
15 years 4 months ago
Connection management without retaining information
Managing a connection between two hosts in a network is an important service to provide in order to make the network useful for many applications. The two main subproblems are the...
Hagit Attiya, Shlomi Dolev, Jennifer L. Welch