Sciweavers

169 search results - page 28 / 34
» Example-based Volume Illustrations
Sort
View
TSMC
2002
182views more  TSMC 2002»
13 years 8 months ago
Bidder's strategy under group-buying auction on the Internet
The group-buying auction is a new kind of dynamic pricing mechanism on the Internet. It is a variant of the sellers' price double auction, which makes the bidders as a group t...
Jian Chen, Xilong Chen, Xiping Song
CGF
2008
175views more  CGF 2008»
13 years 8 months ago
Patch-type Segmentation of Voxel Shapes using Simplified Surface Skeletons
We present a new method for decomposing a 3D voxel shape into disjoint segments using the shape's simplified surface-skeleton. The surface skeleton of a shape consists of 2D ...
Dennie Reniers, Alexandru Telea
PVLDB
2008
104views more  PVLDB 2008»
13 years 8 months ago
Scalable multi-query optimization for exploratory queries over federated scientific databases
The diversity and large volumes of data processed in the Natural Sciences today has led to a proliferation of highlyspecialized and autonomous scientific databases with inherent a...
Anastasios Kementsietsidis, Frank Neven, Dieter Va...
TITB
2010
129views Education» more  TITB 2010»
13 years 3 months ago
iCalm: wearable sensor and network architecture for wirelessly communicating and logging autonomic activity
Widespread use of affective sensing in healthcare applications has been limited due to several practical factors such as lack of comfortable wearable sensors, lack of wireless stan...
Richard Ribon Fletcher, Kelly Dobson, Matthew S. G...
ISI
2008
Springer
13 years 8 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham