Sciweavers

6253 search results - page 385 / 1251
» Use Case Modeling Guidelines
Sort
View
WSC
1998
15 years 6 months ago
ExpertFit: Total Support for Simulation Input Modeling
In this paper, we discuss the critical role of simulation input modeling in a successful simulation study. Two pitfalls in simulation input modeling are then presented and we expl...
Averill M. Law, Michael G. McComas
SIGGRAPH
1998
ACM
15 years 8 months ago
The Office of the Future: A Unified Approach to Image-based Modeling and Spatially Immersive Displays
We introduce ideas, proposed technologies, and initial results for an office of the future that is based on a unified application of computer vision and computer graphics in a sys...
Ramesh Raskar, Greg Welch, Matt Cutts, Adam Lake, ...
160
Voted
ICIP
1998
IEEE
16 years 6 months ago
Invariant-based Data Model for Image Databases
We describe a new invariant-based data model for image databases under our approach for shape-based retrieval. The data model relies on contours description of the image shape, an...
Michael Kliot, Ehud Rivlin
135
Voted
ICS
2009
Tsinghua U.
15 years 11 months ago
Performance modeling and automatic ghost zone optimization for iterative stencil loops on GPUs
Iterative stencil loops (ISLs) are used in many applications and tiling is a well-known technique to localize their computation. When ISLs are tiled across a parallel architecture...
Jiayuan Meng, Kevin Skadron
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 10 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...