Sciweavers

4963 search results - page 979 / 993
» Implementing a Categorical Information System
Sort
View
SIGGRAPH
1993
ACM
14 years 21 days ago
Global visibility algorithms for illumination computations
The most expensive geometric operation in image synthesis is visibility determination. Classically this is solved with hidden surface removal algorithms that render only the parts...
Seth J. Teller, Pat Hanrahan
AOSD
2007
ACM
14 years 19 days ago
Using natural language program analysis to locate and understand action-oriented concerns
Most current software systems contain undocumented high-level ideas implemented across multiple files and modules. When developers perform program maintenance tasks, they often wa...
David Shepherd, Zachary P. Fry, Emily Hill, Lori L...
SIGMETRICS
2010
ACM
195views Hardware» more  SIGMETRICS 2010»
14 years 17 days ago
CWS: a model-driven scheduling policy for correlated workloads
We define CWS, a non-preemptive scheduling policy for workloads with correlated job sizes. CWS tackles the scheduling problem by inferring the expected sizes of upcoming jobs bas...
Giuliano Casale, Ningfang Mi, Evgenia Smirni
ACMIDC
2010
14 years 17 days ago
Paper-based multimedia interaction as learning tool for disabled children
The purpose of our research is to support cognitive, motor, and emotional development of severely disabled children in the school context. We designed and implemented a set of nov...
Franca Garzotto, Manuel Bordogna
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 16 days ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore