Sciweavers

1548 search results - page 234 / 310
» Estimating Software Vulnerabilities
Sort
View
ADBIS
2001
Springer
112views Database» more  ADBIS 2001»
15 years 3 months ago
Detecting Termination of Active Database Rules Using Symbolic Model Checking
One potential problem of active database applications is the non-termination of rules. Although algorithms have been proposed to detect non-termination, almost all provide a conser...
Indrakshi Ray, Indrajit Ray
RT
2001
Springer
15 years 3 months ago
A Perceptually-Based Texture Caching Algorithm for Hardware-Based Rendering
: The performance of hardware-based interactive rendering systems is often constrained by polygon fill rates and texture map capacity, rather than polygon count alone. We present a...
Reynald Dumont, Fabio Pellacini, James A. Ferwerda
COBUILD
1998
Springer
15 years 3 months ago
Sustainability of New Work Practises and Building Concepts
: New forms of communication and co-operation do not have the same environmental impact pattern as current forms of work. Environmental impacts are produced by work technologies (m...
Niklaus Kohler
ASSETS
2007
ACM
15 years 3 months ago
Simulation to predict performance of assistive interfaces
Computers offer valuable assistance to people with physical disabilities. However designing human-computer interfaces for these users is complicated. The range of abilities is mor...
Pradipta Biswas, Peter Robinson
CRV
2004
IEEE
136views Robotics» more  CRV 2004»
15 years 3 months ago
An Optical-Inertial Tracking System for Fully-Enclosed VR Displays
This paper describes a hybrid optical-inertial tracking technology for fully-immersive projective displays. In order to track the operator, the operator wears a 3DOF commercial in...
A. R. Hogue, Michael R. M. Jenkin, Robert S. Allis...