Sciweavers

5665 search results - page 33 / 1133
» Introduction to Computer Security
Sort
View
224
Voted

Book
1615views
17 years 2 days ago
The Not So Short Introduction to LATEX2e
"LATEX is a typesetting system that is very suitable for producing scientific and mathematical documents of high typographical quality. It is also suitable for producing all...
Tobias Oetiker
117
Voted
SIGGRAPH
1998
ACM
15 years 6 months ago
Non-uniform Recursive Subdivision Surfaces
Doo-Sabin and Catmull-Clark subdivision surfaces are based on the notion of repeated knot insertion of uniform tensor product B-spline surfaces. This paperdevelopsrules for non-un...
Thomas W. Sederberg, Jianmin Zheng, David Sewell, ...
105
Voted
ACMSE
2007
ACM
15 years 6 months ago
CluVis: dual-domain visual exploration of cluster/network metadata
CluVis, a prototype for visual monitoring and exploration of cluster and network metadata, is introducted. CluVis builds upon interactively added charts of cluster/network metadat...
Christopher Waters, Jonathan Howell, T. J. Jankun-...

Book
361views
16 years 11 months ago
Introduction to Statistical Signal Processing
"A random or stochastic process is a mathematical model for a phenomenon that evolves in time in an unpredictable manner from the viewpoint of the observer. The phenomenon m...
R.M. Gray
CCS
2010
ACM
15 years 9 months ago
Computationally secure two-round authenticated message exchange
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...