Sciweavers

606 search results - page 119 / 122
» Capturing the Intention of Model Changes
Sort
View
SPAA
1997
ACM
13 years 12 months ago
Accessing Nearby Copies of Replicated Objects in a Distributed Environment
Consider a set of shared objects in a distributed network, where several copies of each object may exist at any given time. To ensure both fast access to the objects as well as e ...
C. Greg Plaxton, Rajmohan Rajaraman, Andréa...
RT
2000
Springer
13 years 11 months ago
Parameterized Animation Compression
Synthetic images can be parameterized by more than time or viewpoint. We generalize image-based rendering by exploiting texture-mapping graphics hardware to decompress ray-traced ...
Ziyad S. Hakura, Jerome Edward Lengyel, John M. Sn...
DIMVA
2008
13 years 9 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
CIC
2004
13 years 9 months ago
Dynamic Characteristics of k-ary n-cube Networks for Real-time Communication
Overlay topologies are now popular with many emerging peer-to-peer (P2P) systems, to efficiently locate and retrieve information. In contrast, the focus of this work is to use ove...
Gerald Fry, Richard West
BMCBI
2008
153views more  BMCBI 2008»
13 years 7 months ago
2DB: a Proteomics database for storage, analysis, presentation, and retrieval of information from mass spectrometric experiments
Background: The amount of information stemming from proteomics experiments involving (multi dimensional) separation techniques, mass spectrometric analysis, and computational anal...
Jens Allmer, Sebastian Kuhlgert, Michael Hippler