Sciweavers

6819 search results - page 1245 / 1364
» Process Reuse Architecture
Sort
View
127
Voted
CCR
2006
116views more  CCR 2006»
15 years 4 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
CGF
2006
198views more  CGF 2006»
15 years 4 months ago
Real-Time Weighted Pose-Space Deformation on the GPU
WPSD (Weighted Pose Space Deformation) is an example based skinning method for articulated body animation. The per-vertex computation required in WPSD can be parallelized in a SIM...
Taehyun Rhee, John P. Lewis, Ulrich Neumann
152
Voted
DPD
2006
98views more  DPD 2006»
15 years 4 months ago
GRACE-based joins on active storage devices
Contemporary long-term storage devices feature powerful embedded processors and sizeable memory buffers. Active Storage Devices (ASD) is the hard disk technology that makes use of ...
Vassilis Stoumpos, Alex Delis
113
Voted
ENTCS
2006
123views more  ENTCS 2006»
15 years 4 months ago
Wrapping of Web Sources with restricted Query Interfaces by Query Tunneling
Information sources in the World Wide Web usually offer two different schemes to their users, an Interface Schema which the user can query and a Result Schema which the user can b...
Thomas Kabisch, Mattis Neiling
IJET
2008
108views more  IJET 2008»
15 years 4 months ago
Moving towards a Fully Automatic Knowledge Assessment Tool
Information about a student's level or state of knowledge is a key aspect for efficient, personalized learning activities. E-learning systems gain such information in two ways...
Christian Guetl
« Prev « First page 1245 / 1364 Last » Next »