Sciweavers

11215 search results - page 1830 / 2243
» Skeleton - Easy Simulation System
Sort
View
ISMIS
2009
Springer
15 years 11 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
160
Voted
ISVC
2009
Springer
15 years 11 months ago
Cartoon Animation Style Rendering of Water
We present a cartoon animation style rendering method for water animation. In an effort to capture and represent crucial features of water observed in traditional cartoon animatio...
Mi You, Jinho Park, Byungkuk Choi, Jun-yong Noh
NOSSDAV
2009
Springer
15 years 11 months ago
A delaunay triangulation architecture supporting churn and user mobility in MMVEs
This article proposes a new distributed architecture for update message exchange in massively multi-user virtual environments (MMVE). MMVE applications require delivery of updates...
Mohsen Ghaffari, Behnoosh Hariri, Shervin Shirmoha...
PET
2009
Springer
15 years 11 months ago
On the Optimal Placement of Mix Zones
Abstract. In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identification. A frequently proposed solution to...
Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux
ISLPED
2009
ACM
184views Hardware» more  ISLPED 2009»
15 years 11 months ago
Online work maximization under a peak temperature constraint
Increasing power densities and the high cost of low thermal resistance packages and cooling solutions make it impractical to design processors for worst-case temperature scenarios...
Thidapat Chantem, Xiaobo Sharon Hu, Robert P. Dick
« Prev « First page 1830 / 2243 Last » Next »