Sciweavers

988 search results - page 157 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
SIGGRAPH
1994
ACM
14 years 29 days ago
Frameless rendering: double buffering considered harmful
The use of double-buffered displays, in which the previous image is displayed until the next image is complete, can impair the interactivity of systems that require tight coupling...
Gary Bishop, Henry Fuchs, Leonard McMillan, Ellen ...
3DPVT
2006
IEEE
295views Visualization» more  3DPVT 2006»
13 years 11 months ago
Efficient Sparse 3D Reconstruction by Space Sweeping
This paper introduces a feature based method for the fast generation of sparse 3D point clouds from multiple images with known pose. We extract sub-pixel edge elements (2D positio...
Joachim Bauer, Christopher Zach, Horst Bischof
USS
2004
13 years 10 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
BMCBI
2007
166views more  BMCBI 2007»
13 years 9 months ago
PathFinder: mining signal transduction pathway segments from protein-protein interaction networks
Background: A Signal transduction pathway is the chain of processes by which a cell converts an extracellular signal into a response. In most unicellular organisms, the number of ...
Gürkan Bebek, Jiong Yang
BMCBI
2006
114views more  BMCBI 2006»
13 years 9 months ago
A direct comparison of protein interaction confidence assignment schemes
Background: Recent technological advances have enabled high-throughput measurements of protein-protein interactions in the cell, producing large protein interaction networks for v...
Silpa Suthram, Tomer Shlomi, Eytan Ruppin, Roded S...