Sciweavers

1020 search results - page 195 / 204
» Implementation of a Constraint-Based Visualization System
Sort
View
EUROSYS
2010
ACM
14 years 2 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
DFG
2001
Springer
14 years 1 months ago
Interactive medical 3D-simulations by means of stereoscopy and standard hardware
: Using stereo-3D hardware in its different solutions is not new, but most available applications use these Hardware only for a better visualization of 3d-reconstructions. It is an...
Kay Melzer, Hans-Gerd Lipinski, Dietrich H. W. Gr&...
WCRE
1999
IEEE
14 years 1 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
VRST
1998
ACM
14 years 1 months ago
Multi-resolution model transmission in distributed virtual environments
Distributed virtual environments allow users at di erent geographical locations to share and interact within a common virtual environment via a local network or through the Intern...
Jimmy H. P. Chim, Rynson W. H. Lau, Antonio Si, Ho...
DEXA
2009
Springer
188views Database» more  DEXA 2009»
14 years 29 days ago
On-the-Fly Integration and Ad Hoc Querying of Life Sciences Databases Using LifeDB
Data intensive applications in Life Sciences extensively use the Hidden Web as a platform for information sharing. Access to these heterogeneous Hidden Web resources is limited thr...
Anupam Bhattacharjee, Aminul Islam, Mohammad Shafk...