Sciweavers

435 search results - page 66 / 87
» The Use of Function and Component Hierarchies to Generate Us...
Sort
View
CGF
1999
153views more  CGF 1999»
13 years 7 months ago
Comprehensive Halftoning of 3D Scenes
The display of images on binary output hardware requires a halftoning step. Conventional halftoning algorithms approximate image values independently from the image content and of...
Oleg Veryovka, John W. Buchanan
ICAC
2006
IEEE
14 years 1 months ago
QMON: QoS- and Utility-Aware Monitoring in Enterprise Systems
Abstract— The scale, reliability, and cost requirements of enterprise data centers require automation of center management. Examples include provisioning, scheduling, capacity pl...
Sandip Agarwala, Yuan Chen, Dejan S. Milojicic, Ka...
TROB
2002
138views more  TROB 2002»
13 years 7 months ago
Interference-free polyhedral configurations for stacking
This paper uses a configuration space ( -space) based method to compute interference-free configuration for stacking polyhedral sheet metal parts. This work forms the interference ...
Venkateswara R. Ayyadevara, David A. Bourne, Kenji...
TVCG
2010
166views more  TVCG 2010»
13 years 5 months ago
An Extension of Wilkinson's Algorithm for Positioning Tick Labels on Axes
—The non-data components of a visualization, such as axes and legends, can often be just as important as the data itself. They provide contextual information essential to interpr...
Justin Talbot, Sharon Lin, Pat Hanrahan
WWW
2005
ACM
14 years 8 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten