Sciweavers

2945 search results - page 534 / 589
» Designing and Implementing Malicious Hardware
Sort
View
CDES
2006
97views Hardware» more  CDES 2006»
15 years 5 months ago
Protein Secondary Structure Prediction Accuracy versus Reduction Methods
Predicting protein secondary structure is a key step in determining the 3D structure of a protein that determines its function. The Dictionary of Secondary Structure of Proteins (...
Saad Osman Abdalla Subair, Safaai Deris
WSCG
2004
120views more  WSCG 2004»
15 years 5 months ago
Voxelization of Solids Using Simplicial Coverings
Rasterization of polygons in 2D is a well known problem, existing several optimal solutions to solve it. The extension of this problem to 3D is more difficult and most existing so...
Antonio J. Rueda Ruiz, Rafael Jesús Segura,...
WSCG
2003
224views more  WSCG 2003»
15 years 5 months ago
Edge-Enhancement - An Algorithm for Real-Time Non-Photorealistic Rendering
In this paper, we propose an algorithm for enhancing edges of real-time non-photorealistic renderings. It is based on the edge map, a 2D texture that encodes visually important ed...
Marc Nienhaus, Jürgen Döllner
USENIX
2000
15 years 5 months ago
Location-Aware Scheduling with Minimal Infrastructure
Mobile computers often benefit from software which adapts to their location. For example, a computer might be backed up when at the office, or the default printer might always be ...
John S. Heidemann, Dhaval Shah
ADHOC
2006
115views more  ADHOC 2006»
15 years 4 months ago
Routing characteristics of ad hoc networks with unidirectional links
Unidirectional links in an ad hoc network can result from factors such as heterogeneity of receiver and transmitter hardware, power control or topology control algorithms, or diff...
Jorjeta G. Jetcheva, David B. Johnson