Sciweavers

2006 search results - page 389 / 402
» Heuristic Security-Testing Methods
Sort
View
VR
2000
IEEE
174views Virtual Reality» more  VR 2000»
14 years 1 months ago
Optimization-Based Virtual Surface Contact Manipulation at Force Control Rates
Previous interactive works have used springs, heuristics, and dynamics for surface placement applications. We present an analytical technique for kilohertz rate manipulation of CA...
Donald D. Nelson, Elaine Cohen
ICCAD
1997
IEEE
122views Hardware» more  ICCAD 1997»
14 years 1 months ago
Approximate timing analysis of combinational circuits under the XBD0 model
This paper is concerned with approximate delay computation algorithms for combinational circuits. As a result of intensive research in the early 90’s [3, 8] efficient tools exi...
Yuji Kukimoto, Wilsin Gosti, Alexander Saldanha, R...
SI3D
1997
ACM
14 years 1 months ago
Post-rendering 3D warping
A pair of rendered images and their Z-buffers contain almost all of the information necessary to re-render from nearby viewpoints. For the small changes in viewpoint that occur in...
William R. Mark, Leonard McMillan, Gary Bishop
FUZZY
1997
Springer
166views Fuzzy Logic» more  FUZZY 1997»
14 years 1 months ago
Optimizing Video Signal Processing Algorithms by Evolution Strategies
Today many kinds of postprocessing are used in digital TV receivers or multimedia terminals for video signals to enhance the picture quality. To achieve this the properties of hum...
H. Blume, O. Franzen, M. Schmidt
SIGMOD
1996
ACM
133views Database» more  SIGMOD 1996»
14 years 1 months ago
Multi-dimensional Resource Scheduling for Parallel Queries
Scheduling query execution plans is an important component of query optimization in parallel database systems. The problem is particularly complex in a shared-nothing execution en...
Minos N. Garofalakis, Yannis E. Ioannidis