Sciweavers

7839 search results - page 1320 / 1568
» What's there and what's not
Sort
View
ACMSE
2009
ACM
15 years 8 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
138
Voted
APGV
2009
ACM
196views Visualization» more  APGV 2009»
15 years 8 months ago
Effects of animation, user-controlled interactions, and multiple static views in understanding 3D structures
Visualizations of 3D spatial structures use various techniques such as user controlled interactions or 2D projection views to convey the structure to users. Researchers have shown...
Taylor Sando, Melanie Tory, Pourang Irani
CANDC
2009
ACM
15 years 8 months ago
Subliminal wiretapping
Subliminal Wiretapping is a subtly interactive artwork that utilizes random number generation modified through mindmatter effects to supply a continuous stream of words. Frequent,...
Shawn Lawson
CANDC
2009
ACM
15 years 8 months ago
Exploring illuminative systems in informal networks of adults
Whenever we feel those ‘higher’ and hard to define sensations like synchronicity, love, wholeness, and appreciation is this a pattern or illuminative system that is part of a ...
Amy K. Scatliff
128
Voted
CF
2009
ACM
15 years 8 months ago
Mapping the LU decomposition on a many-core architecture: challenges and solutions
Recently, multi-core architectures with alternative memory subsystem designs have emerged. Instead of using hardwaremanaged cache hierarchies, they employ software-managed embedde...
Ioannis E. Venetis, Guang R. Gao
« Prev « First page 1320 / 1568 Last » Next »