Sciweavers

215 search results - page 35 / 43
» Evaluation of super-voxel methods for early video processing
Sort
View
ICICS
2005
Springer
14 years 1 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
ISORC
2009
IEEE
14 years 2 months ago
Property Preservation and Composition with Guarantees: From ASSERT to CHESS
While the demand for high-integrity applications continues to rise, industrial developers seek cost effective development strategies that are capable of delivering the required gu...
Tullio Vardanega
ISMAR
2005
IEEE
14 years 1 months ago
Augmented Foam: A Tangible Augmented Reality for Product Design
Computer Aided Design applications have become designers’ inevitable tools for expressing and simulating innovative ideas and concepts. However, replacing traditional materials ...
Woohun Lee, Jun Park
SMA
2005
ACM
104views Solid Modeling» more  SMA 2005»
14 years 1 months ago
Packing a trunk: now with a twist!
In an industry project with a German car manufacturer we are faced with the challenge of placing a maximum number of uniform rigid rectangular boxes in the interior of a car trunk...
Friedrich Eisenbrand, Stefan Funke, Andreas Karren...
DIS
2006
Springer
13 years 11 months ago
Prediction of Domain-Domain Interactions Using Inductive Logic Programming from Multiple Genome Databases
Protein domains are the building blocks of proteins, and their interactions are crucial in forming stable protein-protein interactions (PPI) and take part in many cellular processe...
Thanh Phuong Nguyen, Tu Bao Ho