Sciweavers

134 search results - page 11 / 27
» ccs 2004
Sort
View
VISSYM
2004
13 years 11 months ago
Interactive Treemaps With Detail on Demand to Support Information Search in Documents
This paper addresses the issue of how information visualization techniques can be used to assist full-text search in electronic documents. Our approach supports multiple term quer...
Stefan Schlechtweg, Petra Schulze-Wollgast, Heidru...
VISSYM
2004
13 years 11 months ago
Generalized Distance Transforms and Skeletons in Graphics Hardware
We present a framework for computing generalized distance transforms and skeletons of two-dimensional objects using graphics hardware. Our method is based on the concept of footpr...
Robert Strzodka, Alexandru Telea
CGF
2004
108views more  CGF 2004»
13 years 9 months ago
Interference Detection for Subdivision Surfaces
Accurate and robust interference detection and ray-tracing of subdivision surfaces requires safe linear approximations. Approximation of the limit surface by the subdivided contro...
Xiaobin Wu, Jörg Peters
CCS
2004
ACM
14 years 3 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
CCS
2004
ACM
14 years 3 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li