Sciweavers

1354 search results - page 73 / 271
» Generalized real analysis and its applications
Sort
View
ER
2005
Springer
200views Database» more  ER 2005»
15 years 3 months ago
How to Tame a Very Large ER Diagram (Using Link Analysis and Force-Directed Drawing Algorithms)
Abstract. Understanding a large schema without the assistance of persons already familiar with it (and its associated applications), is a hard and very time consuming task that occ...
Yannis Tzitzikas, Jean-Luc Hainaut
UIST
2006
ACM
15 years 3 months ago
Viz: a visual analysis suite for explaining local search behavior
NP-hard combinatorial optimization problems are common in real life. Due to their intractability, local search algorithms are often used to solve such problems. Since these algori...
Steven Halim, Roland H. C. Yap, Hoong Chuin Lau
EGITALY
2006
14 years 11 months ago
Unambiguous Analysis of Woman Breast Shape for Plastic Surgery Outcome Evaluation
This paper reports a multidisciplinary research between computer science and plastic and reconstructive surgery. In particular, a new method is proposed to unambiguously define a ...
Giovanni Maria Farinella, Gaetano Impoco, Giovanni...
PAMI
2007
196views more  PAMI 2007»
14 years 9 months ago
Bayesian Analysis of Lidar Signals with Multiple Returns
—Time-Correlated Single Photon Counting and Burst Illumination Laser data can be used for range profiling and target classification. In general, the problem is to analyze the res...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 5 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson