Sciweavers

1147 search results - page 29 / 230
» Transformation of Access Rights
Sort
View
JGTOOLS
2006
199views more  JGTOOLS 2006»
13 years 8 months ago
Fast Approximation of High-Order Voronoi Diagrams and Distance Transforms on the GPU
We present a graphics hardware implementation of the tangent-plane algorithm for computing the kth-order Voronoi diagram of a set of point sites in image space. Correct and effici...
Ian Fischer, Craig Gotsman
RTS
2006
176views more  RTS 2006»
13 years 8 months ago
Verifying distributed real-time properties of embedded systems via graph transformations and model checking
Component middleware provides dependable and efficient platforms that support key functional, and quality of service (QoS) needs of distributed real-time embedded (DRE) systems. C...
Gabor Madl, Sherif Abdelwahed, Douglas C. Schmidt
PR
2007
85views more  PR 2007»
13 years 8 months ago
Grey-level hit-or-miss transforms - part II: Application to angiographic image processing
The hit-or-miss transform (HMT) is a fundamental operation on binary images, widely used since 40 years. As it is not increasing, its extension to grey-level images is not straigh...
Benoît Naegel, Nicolas Passat, Christian Ron...
FIMH
2011
Springer
13 years 3 days ago
Monitoring Treatment Outcome: A Visualization Prototype for Left Ventricular Transformation
Abstract. The analysis of cardiac dynamics – especially of the left ventricle – is a means for evaluating the healthiness of the heart. In case that a malfunction has been dete...
Stefan Wesarg
VLSID
2009
IEEE
170views VLSI» more  VLSID 2009»
14 years 9 months ago
Code Transformations for TLB Power Reduction
The Translation Look-aside Buffer (TLB) is a very important part in the hardware support for virtual memory management implementation of high performance embedded systems. The TLB...
Reiley Jeyapaul, Sandeep Marathe, Aviral Shrivasta...