Sciweavers

1770 search results - page 157 / 354
» Writing requirements in computer security
Sort
View
ECCV
2008
Springer
16 years 5 months ago
Closed-Form Solution to Non-rigid 3D Surface Registration
Abstract. We present a closed-form solution to the problem of recovering the 3D shape of a non-rigid inelastic surface from 3D-to-2D correspondences. This lets us detect and recons...
Mathieu Salzmann, Francesc Moreno-Noguer, Vincent ...
108
Voted
CHI
2006
ACM
16 years 4 months ago
Co-authoring with structured annotations
Most co-authoring tools support basic annotations, such as edits and comments that are anchored at specific locations in the document. However, they do not support metacommentary ...
Qixing Zheng, Kellogg S. Booth, Joanna McGrenere
133
Voted
ICPP
2008
IEEE
15 years 10 months ago
Scalable Dynamic Load Balancing Using UPC
An asynchronous work-stealing implementation of dynamic load balance is implemented using Unified Parallel C (UPC) and evaluated using the Unbalanced Tree Search (UTS) benchmark ...
Stephen Olivier, Jan Prins
EUROPAR
2005
Springer
15 years 9 months ago
Developing Java Grid Applications with Ibis
Ibis1 is a programming environment for the development of grid applications in Java. We aim to support a wide range of applications and parallel platforms, so our example programs ...
Kees van Reeuwijk, Rob van Nieuwpoort, Henri E. Ba...
136
Voted
ICDCS
2000
IEEE
15 years 8 months ago
Highly Concurrent Shared Storage
1 Switched system-area networks enable thousands of storage devices to be shared and directly accessed by end hosts, promising databases and filesystems highly scalable, reliable ...
Khalil Amiri, Garth A. Gibson, Richard A. Golding