Sciweavers

1792 search results - page 42 / 359
» Requirements Capture with RCAT
Sort
View
VISUALIZATION
2002
IEEE
15 years 8 months ago
Interactive Translucent Volume Rendering and Procedural Modeling
Direct volume rendering is a commonly used technique in visualization applications. Many of these applications require sophisticated shading models to capture subtle lighting effe...
Joe Kniss, Simon Premoze, Charles D. Hansen, David...
IEEEVAST
2010
14 years 10 months ago
Click2Annotate: Automated Insight Externalization with rich semantics
Insight Externalization (IE) refers to the process of capturing and recording the semantics of insights in decision making and problem solving. To reduce human effort, Automated I...
Yang Chen, Scott Barlowe, Jing Yang
CSE
2011
IEEE
14 years 3 months ago
Performance Enhancement of Network Devices with Multi-Core Processors
— In network based applications, packet capture is the main area that attracts many researchers in developing traffic monitoring systems. Along with the packet capture, many othe...
Nhat-Phuong Tran, Sugwon Hong, Myungho Lee, Seung-...
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 3 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
UM
2009
Springer
15 years 9 months ago
What Do Academic Users Really Want from an Adaptive Learning System?
When developing an Adaptive Learning System (ALS), users are generally consulted (if at all) towards the end of the development cycle. This can limit users’ feedback to the chara...
Martin Harrigan, Milos Kravcik, Christina Steiner,...