Sciweavers

1402 search results - page 246 / 281
» Detecting Change in Data Streams
Sort
View
VISUALIZATION
2002
IEEE
14 years 19 days ago
Exploring Scalar Fields Using Critical Isovalues
Isosurfaces are commonly used to visualize scalar fields. Critical isovalues indicate isosurface topology changes: the creation of new surface components, merging of surface comp...
Gunther H. Weber, Gerik Scheuermann, Hans Hagen, B...
ICA3PP
2009
Springer
14 years 10 days ago
Reliable Greedy Forwarding in Obstacle-Aware Wireless Sensor Networks
We present Obstacle-aware Virtual Circuit geographic Routing (OVCR), a novel routing mechanism for obstacle-aware wireless sensor networks that uses the obstacle-free path computed...
Ming-Tsung Hsu, Frank Yeong-Sung Lin, Yue-Shan Cha...
ICDCS
1997
IEEE
13 years 12 months ago
Supporting Dynamic Space-sharing on Clusters of Non-dedicated Workstations
Clusters of workstations are increasingly being viewed as a cost-e ective alternative to parallel supercomputers. However, resource management and scheduling on workstations clust...
Abdur Chowdhury, Lisa D. Nicklas, Sanjeev Setia, E...
3DPVT
2004
IEEE
177views Visualization» more  3DPVT 2004»
13 years 11 months ago
Seeing into the Past: Creating a 3D Modeling Pipeline for Archaeological Visualization
Archaeology is a destructive process in which accurate and detailed recording of a site is imperative. As a site is exposed, documentation is required in order to recreate and und...
Peter K. Allen, Steven Feiner, Alejandro Troccoli,...
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü