Sciweavers

10055 search results - page 1619 / 2011
» Structured programming using processes
Sort
View
116
Voted
AIR
2002
119views more  AIR 2002»
15 years 3 months ago
Acquiring Customers' Requirements in Electronic Commerce
A key role for Artificial Intelligence technology in electronic commerce is in finding products and services that meet a user's requirements. This may be implemented as a thr...
Ralph Bergmann, Padraig Cunningham
114
Voted
TOG
2002
105views more  TOG 2002»
15 years 3 months ago
Painting and rendering textures on unparameterized models
This paper presents a solution for texture mapping unparameterized models. The quality of a texture on a model is often limited by the model's parameterization into a 2D text...
David (grue) DeBry, Jonathan Gibbs, Devorah DeLeon...
102
Voted
PVLDB
2008
126views more  PVLDB 2008»
15 years 2 months ago
Dwarfs in the rearview mirror: how big are they really?
Online-Analytical Processing (OLAP) has been a field of competing technologies for the past ten years. One of the still unsolved challenges of OLAP is how to provide quick respons...
Jens Dittrich, Lukas Blunschi, Marcos Antonio Vaz ...
JOCN
2010
90views more  JOCN 2010»
15 years 1 months ago
Distinct Neural Correlates for Volitional Generation and Inhibition of Saccades
■ The antisaccade task has proven highly useful in basic and clinical neuroscience, and the neural structures involved are well documented. However, the specific neurocognitive ...
Benedikt Reuter, Christian Kaufmann, Julia Bender,...
137
Voted
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
15 years 1 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
« Prev « First page 1619 / 2011 Last » Next »