Sciweavers

13985 search results - page 2754 / 2797
» Active Feature Models
Sort
View
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 2 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
SIGGRAPH
2000
ACM
14 years 2 months ago
As-rigid-as-possible shape interpolation
We present an object-space morphing technique that blends the interiors of given two- or three-dimensional shapes rather than their boundaries. The morph is rigid in the sense tha...
Marc Alexa, Daniel Cohen-Or, David Levin
CIKM
2000
Springer
14 years 2 months ago
Extending OLAP Querying to External Object Databases
On-Line Analytical Processing (OLAP) systems based on a multidimensional view of data have found widespread use in business applications and are being used increasingly in non-sta...
Torben Bach Pedersen, Arie Shoshani, Junmin Gu, Ch...
ECAI
2000
Springer
14 years 2 months ago
An Embedding of ConGolog in 3APL
Several high-level programming languages for programming agents and robots have been proposed in recent years. Each of these languages has its own features and merits. It is still...
Koen V. Hindriks, Yves Lespérance, Hector J...
SIGGRAPH
1999
ACM
14 years 2 months ago
Multiresolution Mesh Morphing
We present a new method for user controlled morphing of two homeomorphic triangle meshes of arbitrary topology. In particular we focus on the problem of establishing a corresponde...
Aaron W. F. Lee, David P. Dobkin, Wim Sweldens, Pe...
« Prev « First page 2754 / 2797 Last » Next »