Sciweavers

694 search results - page 126 / 139
» Visualisation Techniques for Users and Designers of Layout A...
Sort
View
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
SIAMSC
2008
192views more  SIAMSC 2008»
13 years 7 months ago
Surface Mesh Smoothing, Regularization, and Feature Detection
We describe a hybrid algorithm that is designed to reconstruct a piecewise smooth surface mesh from noisy input. While denoising, our method simultaneously regularizes triangle me...
Hui Huang, Uri M. Ascher
IWCMC
2006
ACM
14 years 1 months ago
Performance evaluation of joint downlink scheduling in multi-cellular OFDMA systems based on IEEE 802.16a
The employment of the OFDMA transmission technique in broadband radio systems shows several benefits. Especially the exploitation of multi-user diversity with the help of sophisti...
Michael Einhaus, Ole Klein, Bernhard Walke, Daniel...
LCN
2007
IEEE
14 years 1 months ago
Achieving True Video-on-Demand Service in Multi-Hop WiMax Mesh Networks
Abstract—In this work, we discuss how to support Video-onDemand service in multi-hop WiMax mesh networks. We are interested in the scenario that end users connect to the video se...
Fei Xie, Kien A. Hua, Ning Jiang
MOBISYS
2007
ACM
14 years 7 months ago
Context browsing with mobiles - when less is more
Except for a handful of "mobile" Web sites, the Web is designed for browsing with personal computers with large screens capable of fitting the content of most Web pages....
Yevgen Borodin, Jalal Mahmud, I. V. Ramakrishnan