Sciweavers

10805 search results - page 1940 / 2161
» Mapping Computation with No Memory
Sort
View
TKDE
2008
177views more  TKDE 2008»
15 years 4 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
TOG
2008
145views more  TOG 2008»
15 years 4 months ago
Real-time KD-tree construction on graphics hardware
We present an algorithm for constructing kd-trees on GPUs. This algorithm achieves real-time performance by exploiting the GPU's streaming architecture at all stages of kd-tr...
Kun Zhou, Qiming Hou, Rui Wang 0004, Baining Guo
JDM
2007
56views more  JDM 2007»
15 years 4 months ago
Temporal Aggregation Using a Multidimensional Index
We present a new method for computing temporal aggregation that uses a multidimensional index. The novelty of our method lies in mapping the start time and end time of a temporal ...
Joon-Ho Woo, Byung Suk Lee, Min-Jae Lee, Woong-Kee...
JMM2
2007
59views more  JMM2 2007»
15 years 4 months ago
Single-Ended Quality Measurement of Noise Suppressed Speech Based on Kullback-Leibler Distances
— In this paper, a single-ended quality measurement algorithm for noise suppressed speech is described. The proposed algorithm computes fast approximations of KullbackLeibler dis...
Tiago H. Falk, Hua Yuan, Wai-Yip Chan
TVCG
2008
140views more  TVCG 2008»
15 years 4 months ago
Efficient Morse Decompositions of Vector Fields
Vector field analysis plays a crucial role in many engineering applications, such as weather prediction, tsunami and hurricane study, and airplane and automotive design. Existing ...
Guoning Chen, Konstantin Mischaikow, Robert S. Lar...
« Prev « First page 1940 / 2161 Last » Next »