Sciweavers

5210 search results - page 157 / 1042
» Computing Capabilities of Mediators
Sort
View
IEEEHPCS
2010
13 years 8 months ago
Discovering closed frequent itemsets on multicore: Parallelizing computations and optimizing memory accesses
The problem of closed frequent itemset discovery is a fundamental problem of data mining, having applications in numerous domains. It is thus very important to have efficient par...
Benjamin Négrevergne, Alexandre Termier, Je...
ISVC
2010
Springer
13 years 8 months ago
Computer-Generated Tie-Dyeing Using a 3D Diffusion Graph
Abstract. Hand dyeing generates artistic representations with unique and complex patterns. The aesthetics of dyed patterns on a cloth originate from the physical properties of dyei...
Yuki Morimoto, Kenji Ono
MICCAI
2003
Springer
14 years 11 months ago
Laser Projection Augmented Reality System for Computer Assisted Surgery
A general-purpose augmented reality apparatus was developed. The system uses rapidly scanned lasers to display information directly onto the patient using the patient as a ``proje...
Neil D. Glossop, Chris Wedlake, John Moore, Terry ...
HICSS
2009
IEEE
118views Biometrics» more  HICSS 2009»
14 years 5 months ago
FXplorer: Exploration of Computed Software Behavior - A New Approach to Understanding and Verification
The craft of software understanding and verification can benefit from technologies that enable evolution toward a true engineering discipline. In current practice, software develo...
Luanne Burns, Timothy Daly
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 5 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...