Sciweavers

1821 search results - page 104 / 365
» Security-Aware Program Transformations
Sort
View
VIS
2003
IEEE
145views Visualization» more  VIS 2003»
14 years 10 months ago
Signed Distance Transform Using Graphics Hardware
This paper presents a signed distance transform algorithm using graphics hardware, which computes the scalar valued function of the Euclidean distance to a given manifold of co-di...
Christian Sigg, Markus H. Gross, Ronald Peikert
PLANX
2007
13 years 10 months ago
XML Transformation Language Based on Monadic Second Order Logic
Although monadic second-order logic (MSO) has been a foundation of XML queries, little work has attempted to take MSO formulae themselves as a programming construct. Indeed, MSO f...
Kazuhiro Inaba, Haruo Hosoya
JCB
2006
107views more  JCB 2006»
13 years 9 months ago
Protein Image Alignment via Piecewise Affine Transformations
Abstract We present a new approach for aligning families of 2D gels. Instead of choosing one of the gels as reference and performing pairwise alignment, we construct an ideal gel t...
Florian A. Potra, Xing Liu, Françoise Seill...
INTERFACES
2010
211views more  INTERFACES 2010»
13 years 7 months ago
HP Transforms Product Portfolio Management with Operations Research
:  HP Transforms Product Portfolio Management with Operations Research Julie Ward, Bin Zhang, Shailendra Jain, Chris Fry, Thomas Olavson, Holger Mishal, Jason Amaral, Dirk Beyer...
Julie Ward, Bin Zhang, Shailendra Jain, Chris Fry,...
FCCM
2003
IEEE
135views VLSI» more  FCCM 2003»
14 years 2 months ago
Efficient Application Representation for HASTE: Hybrid Architectures with a Single, Transformable Executable
Hybrid architectures, which are composed of a conventional processor closely coupled with reconfigurable logic, seem to combine the advantages of both types of hardware. They pres...
Benjamin A. Levine, Herman Schmit