Sciweavers

486 search results - page 74 / 98
» Sound Methods and Effective Tools for Engineering Modeling a...
Sort
View
INFOVIS
2003
IEEE
14 years 2 months ago
Design Choices when Architecting Visualizations
In this paper, we focus on some of the key design decisions we faced during the process of architecting a visualization system and present some possible choices, with their associ...
Diane Tang, Chris Stolte, Robert Bosch
CAD
2008
Springer
13 years 9 months ago
Identification of C1 and C2 discontinuities for surface meshes in CAD
In computer-aided design and meshing, it is often important to identify the discontinuities (singularities) in coarse surface meshes. Due to the potential low resolution and noise...
Xiangmin Jiao, Narasimha R. Bayyana
HICSS
2003
IEEE
182views Biometrics» more  HICSS 2003»
14 years 2 months ago
Business Intelligence Explorer: A Knowledge Map Framework for Discovering Business Intelligence on the Web
Nowadays, information overload hinders the discovery of business intelligence on the World Wide Web. Existing business intelligence tools suffer from a lack of analysis and visual...
Wingyan Chung, Hsinchun Chen, Jay F. Nunamaker
JOT
2008
124views more  JOT 2008»
13 years 8 months ago
Methodological Proposal for Business Process Management sustained in the use of Patterns
At the moment, enterprises require complex business models with an organizational structures, processes and systems that must be explicitly designed. The work designed by these bu...
Pedro Bonillo, Nancy Zambrano, Alecia Eleonora Aco...
CCS
2010
ACM
13 years 5 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...