Sciweavers

7395 search results - page 1387 / 1479
» Social Modeling and i*
Sort
View
SIMUTOOLS
2008
14 years 11 months ago
Simulation of ad hoc networks: ns-2 compared to JiST/SWANS
For the evaluation of ad hoc network protocols, researchers traditionally use simulations because they easily allow for a large number of nodes and reproducible environment condit...
Elmar Schoch, Michael Feiri, Frank Kargl, Michael ...
AAAI
2006
14 years 11 months ago
Characterizing Data Complexity for Conjunctive Query Answering in Expressive Description Logics
Description Logics (DLs) are the formal foundations of the standard web ontology languages OWL-DL and OWL-Lite. In the Semantic Web and other domains, ontologies are increasingly ...
Magdalena Ortiz, Diego Calvanese, Thomas Eiter
CMS
2003
171views Communications» more  CMS 2003»
14 years 11 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
VISSYM
2004
14 years 11 months ago
Interactively Visualizing Procedurally Encoded Scalar Fields
Figure 1: RBF reconstruction of unstructured CFD data. (a) Volume rendering of 1,943,383 tetrahedral shock data set using 2,932 RBF functions. (b) Volume rendering of a 156,642 te...
Yun Jang, Manfred Weiler, Matthias Hopf, Jingshu H...
SGP
2003
14 years 11 months ago
High-Pass Quantization for Mesh Encoding
Any quantization introduces errors. An important question is how to suppress their visual effect. In this paper we present a new quantization method for the geometry of 3D meshes,...
Olga Sorkine, Daniel Cohen-Or, Sivan Toledo
« Prev « First page 1387 / 1479 Last » Next »