Sciweavers

4731 search results - page 863 / 947
» Securing Interactive Programs
Sort
View
SOCA
2008
IEEE
14 years 9 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart
IJRR
2007
181views more  IJRR 2007»
14 years 9 months ago
Optimal Rough Terrain Trajectory Generation for Wheeled Mobile Robots
An algorithm is presented for wheeled mobile robot trajectory generation that achieves a high degree of generality and efficiency. The generality derives from numerical lineariza...
Thomas M. Howard, Alonzo Kelly
CG
2005
Springer
14 years 9 months ago
Recognition and beautification of multi-stroke symbols in digital ink
Sketch-based user interfaces provide a more direct and convenient way for interacting with computers, especially for performing graphical tasks. Most computer programs provide a m...
Heloise Hwawen Hse, A. Richard Newton
VC
2008
132views more  VC 2008»
14 years 9 months ago
Caustic spot light for rendering caustics
It is difficult to render caustic patterns at interactive frame rates. This paper introduces new rendering techniques that relax current constraints, allowing scenes with moving, n...
Xinguo Liu, Zhao Dong, Hujun Bao, Qunsheng Peng
AUTOMATICA
2004
125views more  AUTOMATICA 2004»
14 years 9 months ago
Hamiltonian discretization of boundary control systems
A fundamental problem in the simulation and control of complex physical systems containing distributed-parameter components concerns finite-dimensional approximation. Numerical me...
Goran Golo, Viswanath Talasila, Arjan van der Scha...