Sciweavers

1737 search results - page 328 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
MCS
2008
Springer
13 years 9 months ago
Study on shape creation of building's roof by evaluating aesthetic sensibility
The purpose of this study is to develop an optimum design method for roof shapes satisfying both aesthetic sensibility (beauty) and economic evaluation by using the genetic algori...
Kazutoshi Tsutsumi, Keisuke Sasaki
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
14 years 2 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
ICDE
2006
IEEE
206views Database» more  ICDE 2006»
14 years 10 months ago
Query Co-Processing on Commodity Hardware
The rapid increase in the data volumes for the past few decades has intensified the need for high processing power for database and data mining applications. Researchers have acti...
Anastassia Ailamaki, Naga K. Govindaraju, Dinesh M...
VRCAI
2006
ACM
14 years 3 months ago
Parallel-split shadow maps for large-scale virtual environments
Shadowing effects dramatically enhance the realism of virtual environments by providing useful visual cues. Shadow mapping is an efficient algorithm for real-time shadow renderin...
Fan Zhang, Hanqiu Sun, Leilei Xu, Lee Kit Lun
DOCENG
2004
ACM
14 years 2 months ago
Instructional information in adaptive spatial hypertext
Spatial hypertext is an effective medium for the delivery of help and instructional information on the Web. Spatial hypertext’s intrinsic features allow documents to visually re...
Luis Francisco-Revilla, Frank M. Shipman III