Sciweavers

10790 search results - page 2051 / 2158
» Using feature models to automate model transformations
Sort
View
150
Voted
SMA
2005
ACM
201views Solid Modeling» more  SMA 2005»
15 years 10 months ago
Fast and robust detection of crest lines on meshes
We propose a fast and robust method for detecting crest lines on surfaces approximated by dense triangle meshes. The crest lines, salient surface features defined via first- and...
Shin Yoshizawa, Alexander G. Belyaev, Hans-Peter S...
156
Voted
MM
2004
ACM
248views Multimedia» more  MM 2004»
15 years 10 months ago
Incremental semi-supervised subspace learning for image retrieval
Subspace learning techniques are widespread in pattern recognition research. They include Principal Component Analysis (PCA), Locality Preserving Projection (LPP), etc. These tech...
Xiaofei He
CCS
2004
ACM
15 years 10 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
GRID
2004
Springer
15 years 10 months ago
Toward Characterizing the Performance of SOAP Toolkits
The SOAP protocol underpins Web services as the standard mechanism for exchanging information in a distributed environment. The XML-based protocol offers advantages including exte...
Madhusudhan Govindaraju, Aleksander Slominski, Ken...
153
Voted
ECOOP
2010
Springer
15 years 9 months ago
Recency Types for Analyzing Scripting Languages
Abstract. With the current surge of scripting technologies, large programs are being built with dynamically typed languages. As these programs grow in size, semantics-based tools g...
Phillip Heidegger, Peter Thiemann
« Prev « First page 2051 / 2158 Last » Next »