Sciweavers

39362 search results - page 366 / 7873
» Global Computing Systems
Sort
View
SMA
2006
ACM
132views Solid Modeling» more  SMA 2006»
15 years 10 months ago
Generalized penetration depth computation
— We present an efficient algorithm to compute the generalized penetration depth (PDg) between rigid models. Given two overlapping objects, our algorithm attempts to compute the...
Liangjun Zhang, Young J. Kim, Gokul Varadhan, Dine...
RSS
2007
134views Robotics» more  RSS 2007»
15 years 6 months ago
A Fast and Practical Algorithm for Generalized Penetration Depth Computation
— We present an efficient algorithm to compute the generalized penetration depth (PDg) between rigid models. Given two overlapping objects, our algorithm attempts to compute the...
Liangjun Zhang, Young J. Kim, Dinesh Manocha
ICPR
2002
IEEE
15 years 9 months ago
Brain Symmetry Plane Computation in MR Images Using Inertia Axes and Optimization
Detection of the best symmetry plane in 3D images can be treated as a registration problem between the original and the reflected images. The registration is performed in a 3D sp...
Alexander V. Tuzikov, Olivier Colliot, Isabelle Bl...
ICCAD
1999
IEEE
68views Hardware» more  ICCAD 1999»
15 years 9 months ago
Throughput optimization of general non-linear computations
This paper addresses an optimal technique for throughput optimization of general non-linear data flow computations using a set of transformations. Throughput is widely recognized ...
Inki Hong, Miodrag Potkonjak, Lisa M. Guerra
164
Voted
APNOMS
2006
Springer
15 years 8 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang