Sciweavers

2593 search results - page 487 / 519
» Algorithms and Data Structures for Computer Topology
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
IEEEPACT
2003
IEEE
14 years 2 months ago
Resolving Register Bank Conflicts for a Network Processor
This paper discusses a register bank assignment problem for a popular network processor--Intel's IXP. Due to limited data paths, the network processor has a restriction that ...
Xiaotong Zhuang, Santosh Pande
VISUALIZATION
2002
IEEE
14 years 1 months ago
QuadTIN: Quadtree based Triangulated Irregular Networks
Interactive visualization of large digital elevation models is of continuing interest in scientific visualization, GIS, and virtual reality applications. Taking advantage of the r...
Renato Pajarola, Marc Antonijuan, Roberto Lario
VMV
2007
219views Visualization» more  VMV 2007»
13 years 10 months ago
GPU Rendering of Secondary Effects
In this paper we present an efficient data structure and algorithms for GPU ray tracing of secondary effects like reflections, refractions and shadows. Our method extends previo...
Kai Bürger, Stefan Hertel, Jens Krüger, ...
CN
2007
108views more  CN 2007»
13 years 8 months ago
On the peninsula phenomenon in web graph and its implications on web search
Web masters usually place certain web pages such as home pages and index pages in front of others. Under such a design, it is necessary to go through some pages to reach the desti...
Tao Meng, Hong-Fei Yan