Sciweavers

2851 search results - page 512 / 571
» Operationalizing Conceptual Models Based on a Model of Depen...
Sort
View
VISUALIZATION
1999
IEEE
15 years 8 months ago
Hue-Balls and Lit-Tensors for Direct Volume Rendering of Diffusion Tensor Fields
With the development of magnetic resonance imaging techniques for acquiring diffusion tensor data from biological tissue, visualization of tensor data has become a new research fo...
Gordon L. Kindlmann, David M. Weinstein
HICSS
1998
IEEE
158views Biometrics» more  HICSS 1998»
15 years 8 months ago
Accountability Centered Approach to Business Process Reengineering
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
ISCA
1998
IEEE
151views Hardware» more  ISCA 1998»
15 years 8 months ago
Integrated Predicated and Speculative Execution in the IMPACT EPIC Architecture
Explicitly Parallel Instruction Computing (EPIC) architectures require the compiler to express program instruction level parallelism directly to the hardware. EPIC techniques whic...
David I. August, Daniel A. Connors, Scott A. Mahlk...
ISORC
1998
IEEE
15 years 8 months ago
The Time-Triggered Architecture
The Time-Triggered Architecture (TTA) provides a computing infrastructure for the design and implementation of dependable distributed embedded systems. A large real-time applicatio...
Hermann Kopetz
129
Voted
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 8 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten