Sciweavers

1211 search results - page 223 / 243
» Computing Manipulations of Ranking Systems
Sort
View
HPCA
2006
IEEE
14 years 8 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
CHI
2003
ACM
14 years 8 months ago
Phrase sets for evaluating text entry techniques
In evaluations of text entry methods, participants enter phrases of text using a technique of interest while performance data are collected. This paper describes and publishes (vi...
I. Scott MacKenzie, R. William Soukoreff
CGI
2006
IEEE
14 years 1 months ago
Spline Thin-Shell Simulation of Manifold Surfaces
It has been technically challenging to effectively model and simulate elastic deformation of spline-based, thin-shell objects of complicated topology. This is primarily because tra...
Kexiang Wang, Ying He 0001, Xiaohu Guo, Hong Qin
SIGGRAPH
1992
ACM
13 years 11 months ago
Interactive inspection of solids: cross-sections and interferences
To reduce the cost of correcting design errors, assemblies of mechanical parts are modeled using CAD systems and verified electronically before the designs are sent to manufacturi...
Jarek Rossignac, Abe Megahed, Bengt-Olaf Schneider
BIOINFORMATICS
2005
96views more  BIOINFORMATICS 2005»
13 years 7 months ago
BioLingua: a programmable knowledge environment for biologists
BioLingua is an interactive, web-based programming environment that enables biologists to analyze biological systems by combining knowledge and data through direct end-user progra...
J. P. Massar, Michael Travers, Jeff Elhai, Jeff Sh...