Sciweavers

5722 search results - page 1088 / 1145
» Security Function Interactions
Sort
View
COMPUTING
2004
204views more  COMPUTING 2004»
13 years 9 months ago
Image Registration by a Regularized Gradient Flow. A Streaming Implementation in DX9 Graphics Hardware
The presented image registration method uses a regularized gradient flow to correlate the intensities in two images. Thereby, an energy functional is successively minimized by des...
Robert Strzodka, Marc Droske, Martin Rumpf
CC
2002
Springer
145views System Software» more  CC 2002»
13 years 9 months ago
Forwarding in Attribute Grammars for Modular Language Design
Abstract. Forwarding is a technique for providing default attribute definitions in attribute grammars that is helpful in the modular implementation of programming languages. It com...
Eric Van Wyk, Oege de Moor, Kevin Backhouse, Paul ...
CMPB
2007
86views more  CMPB 2007»
13 years 9 months ago
Monte Carlo simulation of latanoprost induced iris darkening
We show that it is possible to construct numerical models of eye colour from first principles. Our initial model assumes that the important optical interactions occur only in the a...
K. P. B. Cracknell, Damian J. J. Farnell, I. Grier...
SIGCSE
2002
ACM
229views Education» more  SIGCSE 2002»
13 years 9 months ago
GraphicsMentor: a tool for learning graphics fundamentals
This paper discusses the functionality of GraphicsMentor. GraphicsMentor permits a student to modify many parameters of the camera, objects, and light sources interactively, and t...
Dejan Nikolic, Ching-Kuang Shene
TROB
2002
169views more  TROB 2002»
13 years 9 months ago
Constructing reconfigurable software for machine control systems
Reconfigurable software is highly desired for automated machine tool control systems for low-cost products and short time to market. In this paper, we propose a software architectu...
Shige Wang, Kang G. Shin
« Prev « First page 1088 / 1145 Last » Next »