Sciweavers

2925 search results - page 388 / 585
» Input Modeling Using Quantile Statistical Methods
Sort
View
138
Voted
TOG
2012
206views Communications» more  TOG 2012»
13 years 2 months ago
Beady: interactive beadwork design and construction
We introduce the interactive system “Beady” to assist the design and construction of customized 3D beadwork. The user first creates a polygonal mesh model called the design m...
Yuki Igarashi, Takeo Igarashi, Jun Mitani
WOSP
2005
ACM
15 years 6 months ago
From UML to LQN by XML algebra-based model transformations
The change of focus from code to models promoted by OMG's Model Driven Development raises the need for verification of nonfunctional characteristics of UML models, such as pe...
Gordon Ping Gu, Dorina C. Petriu
113
Voted
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 5 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
BMCBI
2010
172views more  BMCBI 2010»
14 years 7 months ago
Nonparametric identification of regulatory interactions from spatial and temporal gene expression data
Background: The correlation between the expression levels of transcription factors and their target genes can be used to infer interactions within animal regulatory networks, but ...
Anil Aswani, Soile V. E. Keränen, James Brown...
AES
2008
Springer
182views Cryptology» more  AES 2008»
15 years 17 days ago
Logical product models for automated scripting of process-level construction animations
Animation can add significant value to Discrete-Event Simulation by helping verify, validate, and accredit simulation analyses. This is particularly true in construction where typ...
Vineet R. Kamat