Sciweavers

66 search results - page 11 / 14
» From Acme to CORBA: Bridging the Gap
Sort
View
CHIMIT
2007
ACM
15 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
FPGA
2008
ACM
151views FPGA» more  FPGA 2008»
14 years 11 months ago
Beyond the arithmetic constraint: depth-optimal mapping of logic chains in LUT-based FPGAs
Look-up table based FPGAs have migrated from a niche technology for design prototyping to a valuable end-product component and, in some cases, a replacement for general purpose pr...
Michael T. Frederick, Arun K. Somani
67
Voted
CGF
2008
156views more  CGF 2008»
14 years 9 months ago
Automatic Conversion of Mesh Animations into Skeleton-based Animations
Recently, it has become increasingly popular to represent animations not by means of a classical skeleton-based model, but in the form of deforming mesh sequences. The reason for ...
Edilson de Aguiar, Christian Theobalt, Sebastian T...
MMDB
2003
ACM
132views Multimedia» more  MMDB 2003»
15 years 2 months ago
Image database retrieval utilizing affinity relationships
Recent research effort in Content-Based Image Retrieval (CBIR) focuses on bridging the gap between low-level features and highlevel semantic contents of images as this gap has bec...
Mei-Ling Shyu, Shu-Ching Chen, Min Chen, Chengcui ...
CGF
2011
14 years 1 months ago
Walking On Broken Mesh: Defect-Tolerant Geodesic Distances and Parameterizations
Efficient methods to compute intrinsic distances and geodesic paths have been presented for various types of surface representations, most importantly polygon meshes. These meshe...
Marcel Campen, Leif Kobbelt