Sciweavers

340 search results - page 28 / 68
» On second order operators and quadratic operators
Sort
View
CGI
2006
IEEE
14 years 1 months ago
Subdivision Depth Computation for Extra-Ordinary Catmull-Clark Subdivision Surface Patches
A second order forward differences based subdivision depth computation technique for extra-ordinary Catmull-Clark subdivision surface (CCSS) patches is presented. The new techniqu...
Fuhua (Frank) Cheng, Gang Chen, Jun-Hai Yong
RSP
2006
IEEE
14 years 1 months ago
Wcomp: a Multi-Design Approach for Prototyping Applications using Heterogeneous Resources
This paper presents Wcomp which is a framework for rapid application prototyping. This framework has been developed for targeting wearable computing applications but can also be u...
Daniel Cheung-Foo-Wo, Jean-Yves Tigli, Stephane La...
SACMAT
2004
ACM
14 years 1 months ago
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
Joachim Biskup, Sandra Wortmann
SIBGRAPI
1999
IEEE
13 years 12 months ago
Developing Morphological Building Blocks: From Design to Implementation
Abstract. Mathematical morphology has become a widely used technique for image processing and computer vision. Initially designed as a set theory, it was generalized to the set of ...
Marcos Cordeiro d'Ornellas, Rein van den Boomgaard
CHI
1995
ACM
13 years 11 months ago
Hyper-G and harmony: towards the next generation of networked information technology
Current networked information systems on the Internet, whilst extremely successful, run into problems of fragmentation, consistency, scalability, and loss of orientation. The deve...
Keith Andrews, Frank Kappe, Hermann A. Maurer