Sciweavers

101 search results - page 19 / 21
» Exploring Ink Spreading
Sort
View
VISUALIZATION
2003
IEEE
14 years 28 days ago
Using Deformations for Browsing Volumetric Data
Many traditional techniques for “looking inside” volumetric data involve removing portions of the data, for example using various cutting tools, to reveal the interior. This a...
Michael J. McGuffin, Liviu Tancau, Ravin Balakrish...
SACMAT
2009
ACM
14 years 9 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ERCIMDL
1998
Springer
183views Education» more  ERCIMDL 1998»
13 years 12 months ago
The Alexandria Digital Library Architecture
Abstract. Since 1994, the Alexandria Digital Library Project has developed three prototype digital libraries for georeferenced information. This paper describes the most recent of ...
James Frew, Michael Freeston, Nathan Freitas, Lind...
CMS
2006
13 years 9 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
GECCO
2008
Springer
107views Optimization» more  GECCO 2008»
13 years 8 months ago
The influence of scaling and assortativity on takeover times in scale-free topologies
In evolving systems, the topological characteristics of population structure have a pronounced impact on the rate of spread of advantageous alleles, and therefore affect selective...
Joshua L. Payne, Margaret J. Eppstein