Sciweavers

2687 search results - page 427 / 538
» On the Conversion between Number Systems
Sort
View
IJVR
2007
128views more  IJVR 2007»
13 years 8 months ago
Occlusion Management in Immersive and Desktop 3D Virtual Environments: Theory and Evaluation
—We present an empirical usability experiment studying the relative strengths and weaknesses of three different occlusion management techniques for discovering and accessing obje...
Niklas Elmqvist, Mihail Eduard Tudoreanu
TCAD
2008
118views more  TCAD 2008»
13 years 8 months ago
CHIPS: Custom Hardware Instruction Processor Synthesis
This paper describes an integer-linear-programming (ILP)-based system called Custom Hardware Instruction Processor Synthesis (CHIPS) that identifies custom instructions for critica...
Kubilay Atasu, Can C. Özturan, Günhan D&...
TCBB
2008
126views more  TCBB 2008»
13 years 8 months ago
Combinatorial Approaches for Mass Spectra Recalibration
Mass spectrometry has become one of the most popular analysis techniques in Proteomics and Systems Biology. With the creation of larger data sets, the automated recalibration of ma...
Sebastian Böcker, Veli Mäkinen
JAPLL
2007
101views more  JAPLL 2007»
13 years 8 months ago
Data-driven type checking in open domain question answering
Many open domain question answering systems answer questions by first harvesting a large number of candidate answers, and then picking the most promising one from the list. One c...
Stefan Schlobach, David Ahn, Maarten de Rijke, Val...
JCP
2007
132views more  JCP 2007»
13 years 8 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...