Sciweavers

6656 search results - page 1264 / 1332
» Change, Change, Change: Three Approaches
Sort
View
DAC
2006
ACM
14 years 2 months ago
Signature-based workload estimation for mobile 3D graphics
Until recently, most 3D graphics applications had been regarded as too computationally intensive for devices other than desktop computers and gaming consoles. This notion is rapid...
Bren Mochocki, Kanishka Lahiri, Srihari Cadambi, X...
ETRA
2006
ACM
114views Biometrics» more  ETRA 2006»
14 years 2 months ago
Visual attention in 3D video games
Understanding players’ visual attention patterns within an interactive 3D game environment is an important research area that can improve game level design and graphics. Several...
Su Yan, Magy Seif El-Nasr
IWCMC
2006
ACM
14 years 2 months ago
Resolving islands of security problem for DNSSEC
The DNS Security Extensions (DNSSEC) were developed to add origin authentication and integrity. DNSSEC defined a public key infrastructure over DNS tree hierarchy for the public ...
Eunjong Kim, Ashish Gupta, Batsukh Tsendjav, Danie...
JCDL
2006
ACM
176views Education» more  JCDL 2006»
14 years 2 months ago
A hierarchical, HMM-based automatic evaluation of OCR accuracy for a digital library of books
A number of projects are creating searchable digital libraries of printed books. These include the Million Book Project, the Google Book project and similar efforts from Yahoo an...
Shaolei Feng, R. Manmatha
MSR
2006
ACM
14 years 2 months ago
Predicting defect densities in source code files with decision tree learners
With the advent of open source software repositories the data available for defect prediction in source files increased tremendously. Although traditional statistics turned out t...
Patrick Knab, Martin Pinzger, Abraham Bernstein
« Prev « First page 1264 / 1332 Last » Next »