Sciweavers

77 search results - page 12 / 16
» A User Authentication System Using Schema of Visual Memory
Sort
View
IJVR
2006
124views more  IJVR 2006»
13 years 7 months ago
Improving Virtual Reality Applications in CAD through Semantics
In this article we propose an architecture for the inclusion and exploitation of semantic aspects in a CAD environment. Our schema focuses on the enhancement and improvement of a c...
Carlos Toro, Jorge Posada, Stefan Wundrak, Andr&ea...
VISUALIZATION
2005
IEEE
14 years 28 days ago
VolQD: Direct Volume Rendering of Multi-million Atom Quantum Dot Simulations
In this work we present a hardware-accelerated direct volume rendering system for visualizing multivariate wave functions in semiconducting quantum dot (QD) simulations. The simul...
Wei Qiao, David S. Ebert, Alireza Entezari, Marek ...
SOFTVIS
2010
ACM
13 years 7 months ago
Towards anomaly comprehension: using structural compression to navigate profiling call-trees
Developers must often diagnose anomalies in programs they only have a partial knowledge of. As a result, they must simultaneously reverse engineer parts of the system they are unf...
Shen Lin 0003, François Taïani, Thomas...
SIGUCCS
2003
ACM
14 years 18 days ago
Macintosh OS X: a smooth migration
The Ringling School of Art and Design is a fully accredited four year college of visual art and design with a student population of approximately 1000. The Ringling School has ach...
Scott E. Hanselman, Mahmoud Pegah
EUROPKI
2004
Springer
14 years 22 days ago
Trustworthy Accounting for Wireless LAN Sharing Communities
Abstract. The Peer-to-Peer Wireless Network Confederation (P2PWNC) is designed to be an open self-organizing Wireless LAN (WLAN) roaming association where users from one WLAN can a...
Elias C. Efstathiou, George C. Polyzos