Sciweavers

1795 search results - page 272 / 359
» Security Models and Information Flow
Sort
View
IV
2005
IEEE
149views Visualization» more  IV 2005»
14 years 2 months ago
Visualisation Techniques for Users and Designers of Layout Algorithms
Visualisation systems consisting of a set of components through which data and interaction commands flow have been explored by a number of researchers. Such hybrid and multistage ...
Greg Ross, Alistair Morrison, Matthew Chalmers
VIZSEC
2004
Springer
14 years 2 months ago
Email archive analysis through graphical visualization
The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spa...
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
ATAL
2003
Springer
14 years 2 months ago
Information-driven phase changes in multi-agent coordination
Large systems of agents deployed in a real-world environment face threats to their problem solving performance that are independent of the complexity of the problem or the charact...
Sven Brueckner, H. Van Dyke Parunak
JPDC
2006
95views more  JPDC 2006»
13 years 9 months ago
Speculative pre-execution assisted by compiler (SPEAR)
Speculative pre-execution achieves efficient data prefetching by running additional prefetching threads on spare hardware contexts. Various implementations for speculative pre-exe...
Won Woo Ro, Jean-Luc Gaudiot
MVA
2010
229views Computer Vision» more  MVA 2010»
13 years 3 months ago
Robust 3D object registration without explicit correspondence using geometric integration
3D vision guided manipulation of components is a key problem of industrial machine vision. In this paper, we focus on the localization and pose estimation of known industrial objec...
Dirk Breitenreicher, Christoph Schnörr