Sciweavers

1737 search results - page 255 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
110
Voted
CVPR
2005
IEEE
16 years 4 months ago
Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers
This paper presents a decentralized approach to multiple target tracking. The novelty of this approach lies in the use of a set of autonomous while collaborative trackers to overc...
Ting Yu, Ying Wu
EGPGV
2004
Springer
214views Visualization» more  EGPGV 2004»
15 years 8 months ago
Hierarchical Visualization and Compression of Large Volume Datasets Using GPU Clusters
We describe a system for the texture-based direct volume visualization of large data sets on a PC cluster equipped with GPUs. The data is partitioned into volume bricks in object ...
Magnus Strengert, Marcelo Magallón, Daniel ...
OOPSLA
2004
Springer
15 years 8 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
104
Voted
SMI
2007
IEEE
164views Image Analysis» more  SMI 2007»
15 years 8 months ago
Topology driven 3D mesh hierarchical segmentation
In this paper, we propose to address the semanticoriented 3D mesh hierarchical segmentation problem, using enhanced topological skeletons [18]. This high level information drives ...
Julien Tierny, Jean-Philippe Vandeborre, Mohamed D...
CLEF
2007
Springer
15 years 8 months ago
Stemming Approaches for East European Languages
In our participation in this CLEF evaluation campaign, the first objective is to propose and evaluate various indexing and search strategies for the Czech language in order to hop...
Ljiljana Dolamic, Jacques Savoy