Sciweavers

6348 search results - page 1210 / 1270
» Extensible control architectures
Sort
View
AUSFORENSICS
2003
13 years 10 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
WSCG
2004
151views more  WSCG 2004»
13 years 9 months ago
Inserting G1 Discontinuities into Free-form Features for Aesthetic Design
Free form shapes are often used to fulfil both aesthetic and design constraints applied to parametric models currently adopted in CAD environments. Up to now, designers and engine...
Vincent Cheutet, Jean-Philippe Pernot, Jean-Claude...
IFIP3
1998
151views Education» more  IFIP3 1998»
13 years 9 months ago
Conceptual Workflow Modelling for Remote Courses
Development of a wide spread project intended to teaching Computer Science, integrating a considerable number of students all over a country with big geographical extension and sc...
José Palazzo M. de Oliveira, Mariano Nicola...
NIPS
1998
13 years 9 months ago
Divisive Normalization, Line Attractor Networks and Ideal Observers
Gain control by divisive inhibition, a.k.a. divisive normalization, has been proposed to be a general mechanism throughout the visual cortex. We explore in this study the statisti...
Sophie Deneve, Alexandre Pouget, Peter E. Latham
WSC
1998
13 years 9 months ago
Marine Corps Analytic Modeling and Simulation
The Marine Corps has instituted a new Mission Area Analysis (MAA) process to identify operational requirements and deficiencies. In the past, the MAA process was subjective and so...
William A. Sawyers
« Prev « First page 1210 / 1270 Last » Next »