Sciweavers

7930 search results - page 1293 / 1586
» Greedy in Approximation Algorithms
Sort
View
VISUALIZATION
1998
IEEE
15 years 9 months ago
Large scale terrain visualization using the restricted quadtree triangulation
Real-time rendering of triangulated surfaces has attracted growing interest in the last few years. However, interactive visualization of very large scale grid digital elevation mo...
Renato Pajarola
125
Voted
COCO
1998
Springer
98views Algorithms» more  COCO 1998»
15 years 9 months ago
Probabilistic Martingales and BPTIME Classes
We define probabilistic martingales based on randomized approximation schemes, and show that the resulting notion of probabilistic measure has several desirable robustness propert...
Kenneth W. Regan, D. Sivakumar
121
Voted
GCB
1998
Springer
78views Biometrics» more  GCB 1998»
15 years 9 months ago
Computational approaches to identify Leucine Zippers
The leucine zipper is a dimerization domain occurring mostly in regulatory and thus in many oncogenic proteins. The leucine repeat in the sequence has been traditionally used for ...
Erich Bornberg-Bauer
130
Voted
FCCM
1997
IEEE
111views VLSI» more  FCCM 1997»
15 years 9 months ago
Real-time stereo vision on the PARTS reconfigurable computer
This paper describes a powerful, scalable, reconfigurable computer called the PARTS engine. The PARTS engine consists of 16 Xilinx 4025 FPGAs, and 16 one-megabyte SRAMs. The FPGAs...
John Woodfill, Brian Von Herzen
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 9 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
« Prev « First page 1293 / 1586 Last » Next »