Sciweavers

283 search results - page 36 / 57
» Integrating Constraints and Direct Manipulation
Sort
View
TEI
2009
ACM
89views Hardware» more  TEI 2009»
14 years 2 months ago
Running up Blueberry Hill: prototyping whole body interaction in harmony space
Musical harmony is considered to be one of the most and technically difficult parts of music. It is y taught formally via abstract, domain-specific concepts, principles, rules and...
Simon Holland, Paul Marshall, Jon Bird, Nick Sheep...
VLDB
2007
ACM
77views Database» more  VLDB 2007»
14 years 1 months ago
Tracing Lineage Beyond Relational Operators
Tracing the lineage of data is an important requirement for establishing the quality and validity of data. Recently, the problem of data provenance has been increasingly addressed...
Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, Sunil Pr...
VRST
2000
ACM
13 years 12 months ago
Animated deformations with radial basis functions
We present a novel approach to creating deformations of polygonal models using Radial Basis Functions (RBFs) to produce localized real-time deformations. Radial Basis Functions as...
Jun-yong Noh, Douglas Fidaleo, Ulrich Neumann
ICCAD
1998
IEEE
95views Hardware» more  ICCAD 1998»
13 years 11 months ago
Efficient analog circuit synthesis with simultaneous yield and robustness optimization
This paper presents an efficient statistical design methodology that allows simultaneous sizing for performance and optimization for yield and robustness of analog circuits. The s...
Geert Debyser, Georges G. E. Gielen
ACSAC
2001
IEEE
13 years 11 months ago
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading
The issue of certificate masquerading against the SSL protocol is pointed out in [4]. In [4], various forms of server certificate masquerading are identified. It should also be no...
James M. Hayes