Sciweavers

476 search results - page 66 / 96
» General Constrained Deformations based on Generalized Metaba...
Sort
View
CANDC
2005
ACM
15 years 1 months ago
Computational schemes for biomimetic sculpture
A prototype system for the automatic evolution of biomimetic structures using structural automata is described and its utility for generating digital sculpture is demonstrated. Sc...
Brower Hatcher, Karl Aspelund, Andrew R. Willis, J...
CCS
2009
ACM
16 years 10 days ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
16 years 4 days ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
SIGGRAPH
1993
ACM
15 years 3 months ago
Interval methods for multi-point collisions between time-dependent curved surfaces
We present an efficient and robust algorithm for finding points of collision between time-dependent parametric and implicit surfaces. The algorithm detects simultaneous collisio...
John M. Snyder, Adam R. Woodbury, Kurt W. Fleische...
SIGCSE
2012
ACM
284views Education» more  SIGCSE 2012»
13 years 7 months ago
Teaching operating systems using android
The computing landscape is shifting towards mobile devices. To learn about operating systems, it is increasingly important for students to gain hands-on kernel programming experie...
Jeremy Andrus, Jason Nieh