Sciweavers

26354 search results - page 5153 / 5271
» How we refactor, and how we know it
Sort
View
TGIS
2010
137views more  TGIS 2010»
14 years 12 months ago
Semantic Enablement for Spatial Data Infrastructures
Building on abstract reference models, the Open Geospatial Consortium (OGC) has established standards for storing, discovering, and processing geographical information. These stan...
Krzysztof Janowicz, Sven Schade, Arne Bröring...
TPDS
2010
98views more  TPDS 2010»
14 years 12 months ago
The Synchronization Power of Coalesced Memory Accesses
—Multicore architectures have established themselves as the new generation of computer architectures. As part of the one core to many cores evolution, memory access mechanisms ha...
Phuong Hoai Ha, Philippas Tsigas, Otto J. Anshus
TVCG
2010
205views more  TVCG 2010»
14 years 12 months ago
Estimation of Detection Thresholds for Redirected Walking Techniques
—In immersive virtual environments (IVEs) users can control their virtual viewpoint by moving their tracked head and by walking through the real world. Usually, movements in the ...
Frank Steinicke, Gerd Bruder, Jason Jerald, Harald...
101
Voted
WCRE
2010
IEEE
14 years 12 months ago
Visually Supporting Source Code Changes Integration: The Torch Dashboard
—Automatic and advanced merging algorithms help programmers to merge their modifications in main development repositories. However, there is little support to help release maste...
Veroonica Uquillas Gomez, Stéphane Ducasse,...
ASIACRYPT
2010
Springer
14 years 11 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
« Prev « First page 5153 / 5271 Last » Next »