Sciweavers

15379 search results - page 2857 / 3076
» Protecting users from
Sort
View
SSDBM
1999
IEEE
118views Database» more  SSDBM 1999»
15 years 8 months ago
Evaluation of Ad Hoc OLAP: In-Place Computation
Large scale data analysis and mining activities, such as identifying interesting trends, making unusual patterns to stand out and verifying hypotheses, require sophisticated infor...
Damianos Chatziantoniou
VR
1999
IEEE
169views Virtual Reality» more  VR 1999»
15 years 8 months ago
Hand-Held Windows: Towards Effective 2D Interaction in Immersive Virtual Environments
The study of human-computer interaction within immersive virtual environments requires us to balance what we have learned from the design and use of desktop interfaces with novel ...
Robert W. Lindeman, John L. Sibert, James K. Hahn
ICNP
1998
IEEE
15 years 8 months ago
Darwin: Customizable Resource Management for Value-Added Network Services
The Internet is rapidly changing from a set of wires and switches that carry packets into a sophisticated infrastructure that delivers a set of complex value-added services to end...
Prashant R. Chandra, Allan Fisher, Corey Kosak, T....
VISUALIZATION
1998
IEEE
15 years 8 months ago
Building perceptual textures to visualize multidimensional datasets
This paper presents a new method for using texture to visualize multidimensional data elements arranged on an underlying threedimensional height field. We hope to use simple textu...
Christopher G. Healey, James T. Enns
CAV
1998
Springer
175views Hardware» more  CAV 1998»
15 years 8 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
« Prev « First page 2857 / 3076 Last » Next »