Sciweavers

14190 search results - page 2569 / 2838
» computing 2008
Sort
View
SMI
2008
IEEE
116views Image Analysis» more  SMI 2008»
15 years 10 months ago
Self-organizing primitives for automated shape composition
Motivated by the ability of living cells to form into specific shapes and structures, we present a new approach to shape modeling based on self-organizing primitives whose behavi...
Linge Bai, Manolya Eyiyurekli, David E. Breen
145
Voted
SMI
2008
IEEE
204views Image Analysis» more  SMI 2008»
15 years 10 months ago
SHREC'08 entry: 3D face recognition using facial contour curves
In this work we compute the similarity of 3D faces using a set of eight contour curves. These contours were selected and matched using our 3D face matching framework. In previous ...
Frank B. ter Haar, Remco C. Veltkamp
SMI
2008
IEEE
110views Image Analysis» more  SMI 2008»
15 years 10 months ago
OCTOR: OCcurrence selecTOR in pattern hierarchies
Hierarchies of patterns of features, of sub-assemblies, or of CSG sub-expressions are used in architectural and mechanical CAD to eliminate laborious repetitions from the design p...
Justin Jang, Jarek Rossignac
SOCC
2008
IEEE
124views Education» more  SOCC 2008»
15 years 10 months ago
Energy minimization using a greedy randomized heuristic for the voltage assignment problem in NoC
— Scaling down the voltage levels of the processing elements (PEs) in a Network-on-Chip (NoC) can significantly reduce the computation energy consumption with an overhead of the...
Pavel Ghosh, Arunabha Sen
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 10 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
« Prev « First page 2569 / 2838 Last » Next »