Sciweavers

1968 search results - page 369 / 394
» The Complexity of Valued Constraint Models
Sort
View
162
Voted
PASTE
2005
ACM
15 years 9 months ago
Generalizing symbolic execution to library classes
Forward symbolic execution is a program analysis technique that allows using symbolic inputs to explore program executions. The traditional applications of this technique have foc...
Sarfraz Khurshid, Yuk Lai Suen
135
Voted
IMR
2004
Springer
15 years 9 months ago
3D Hybrid Mesh Generation for Reservoir Flow Simulation
A great challenge for flow simulators of new generation is to gain more accuracy at well proximity within complex geological structures. For this purpose, a new approach based on...
N. Flandrin, Houman Borouchaki, Chakib Bennis
EGH
2003
Springer
15 years 9 months ago
Automatic shader level of detail
Current graphics hardware can render procedurally shaded objects in real-time. However, due to resource and performance limitations, interactive shaders can not yet approach the c...
Marc Olano, Bob Kuehne, Maryann Simmons
137
Voted
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
15 years 9 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
157
Voted
CAISE
2006
Springer
15 years 8 months ago
Loosely-Coupled Process Automation in Medical Environments
Abstract. We discuss a case study for the hospital scenario where workflow model components are distributed across various computers or devices (e.g. mobile phones, PDAs, sensors, ...
Jurate Vysniauskaite