Sciweavers

5564 search results - page 987 / 1113
» Performance Modeling of HPC Applications
Sort
View
TDSC
2008
99views more  TDSC 2008»
13 years 9 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
JCC
2007
131views more  JCC 2007»
13 years 9 months ago
An extended dead-end elimination algorithm to determine gap-free lists of low energy states
: Proteins are flexible systems and commonly populate several functionally important states. To understand protein function, these states and their energies have to be identified...
Edda Kloppmann, G. Matthias Ullmann, Torsten Becke...
TOG
2008
145views more  TOG 2008»
13 years 9 months ago
Real-time KD-tree construction on graphics hardware
We present an algorithm for constructing kd-trees on GPUs. This algorithm achieves real-time performance by exploiting the GPU's streaming architecture at all stages of kd-tr...
Kun Zhou, Qiming Hou, Rui Wang 0004, Baining Guo
TOG
2008
154views more  TOG 2008»
13 years 9 months ago
Accelerometer-based user interfaces for the control of a physically simulated character
In late 2006, Nintendo released a new game controller, the Wiimote, which included a three-axis accelerometer. Since then, a large variety of novel applications for these controll...
Takaaki Shiratori, Jessica K. Hodgins
TOPNOC
2008
13 years 9 months ago
Assessing State Spaces Using Petri-Net Synthesis and Attribute-Based Visualization
State spaces are commonly used representations of system behavior. A state space may be derived from a model of system behavior but can also be obtained through process mining. For...
H. M. W. (Eric) Verbeek, A. Johannes Pretorius, Wi...