• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,119
Next 10 →

PETSc users manual

by Satish Balay, Kris Buschelman, Victor Eijkhout, Dinesh Kaushik, Matt Knepley, Lois Curfman Mcinnes, Barry Smith, Hong Zhang - ANL-95/11 - Revision 2.1.0, Argonne National Laboratory , 2001
"... tract W-31-109-Eng-38. 2 This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Compu-tation (PETSc) is a suite of data structures and routines that provid ..."
Abstract - Cited by 282 (20 self) - Add to MetaCart
tract W-31-109-Eng-38. 2 This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Compu-tation (PETSc) is a suite of data structures and routines

3-D Sound for Virtual Reality and Multimedia

by Durand Begault , 2000
"... This paper gives HRTF magnitude data in numerical form for 43 frequencies between 0.2---12 kHz, the average of 12 studies representing 100 different subjects. However, no phase data is included in the tables; group delay simulation would need to be included in order to account for ITD. In 3-D sound ..."
Abstract - Cited by 290 (5 self) - Add to MetaCart
This paper gives HRTF magnitude data in numerical form for 43 frequencies between 0.2---12 kHz, the average of 12 studies representing 100 different subjects. However, no phase data is included in the tables; group delay simulation would need to be included in order to account for ITD. In 3-D sound

The instructive animation: Helping students build connections between words and pictures in multimedia learning

by Richard E. Mayer, Richard B. Anderson - Journal of Educational Psychology , 1992
"... In 2 experiments, students studied an animation depicting the operation of a bicycle tire pump or an automobile braking system, along with concurrent oral narration of the steps in the process (concurrent group), successive presentation of animation and narration (by 4 different methods), animation ..."
Abstract - Cited by 175 (15 self) - Add to MetaCart
In 2 experiments, students studied an animation depicting the operation of a bicycle tire pump or an automobile braking system, along with concurrent oral narration of the steps in the process (concurrent group), successive presentation of animation and narration (by 4 different methods), animation

Can ISPs and P2P users cooperate for improved performance

by Vinay Aggarwal, Anja Feldmann, Christian Scheideler, Michalis Faloutsos, Vinay Aggarwal, Anja Feldmann - ACM SIGCOMM Computer Communication Review , 2007
"... This paper addresses the antagonistic relationship between overlay/p2p networks and IPS providers: they both try to manage and control traffic at different level and with different goals, but in a way that inevitably leads to overlapping, duplicated, and conflicting behavior. The creation of a p2p n ..."
Abstract - Cited by 120 (5 self) - Add to MetaCart
This paper addresses the antagonistic relationship between overlay/p2p networks and IPS providers: they both try to manage and control traffic at different level and with different goals, but in a way that inevitably leads to overlapping, duplicated, and conflicting behavior. The creation of a p2p

Visually Impaired Users

by Rameshsharma Ramloll, Stephen Brewster, Wai Yu, Beate Riedel
"... We investigated two solutions for numerical (2D) tabular data discovery and overview for visually impaired and blind users. One involved accessing information in tables (26 rows x 10 columns containing integers between and including 0 and 100) by this target user group using both speech and non-spee ..."
Abstract - Add to MetaCart
We investigated two solutions for numerical (2D) tabular data discovery and overview for visually impaired and blind users. One involved accessing information in tables (26 rows x 10 columns containing integers between and including 0 and 100) by this target user group using both speech and non

Choosing Effective Colours for Data Visualization

by Christopher G. Healey - Proc. Seventh IEEE Conf. Visualization (VIS ’96 , 1996
"... In this paper we describe a technique for choosing multiple colours for use during data visualization. Our goal is a systematic method for maximizing the total number of colours available for use, while still allowing an observer to rapidly and accurately search a display for any one of the given co ..."
Abstract - Cited by 99 (13 self) - Add to MetaCart
visualization. CR Descriptors: H.5.2 [Information Interfaces and Presentation]: User Interfaces- ergonomics, screen design (graphics,

Visual Rank: applying Page Rank to large-scale image search

by Yushi Jing, Shumeet Baluja - IEEE Trans. Pattern Analysis and Machine Intelligence , 2008
"... Abstract—Because of the relative ease in understanding and processing text, commercial image-search systems often rely on techniques that are largely indistinguishable from text search. Recently, academic studies have demonstrated the effectiveness of employing image-based features to provide either ..."
Abstract - Cited by 96 (4 self) - Add to MetaCart
the performance of such an approach in a real system, we conducted a series of large-scale experiments based on the task of retrieving images for 2,000 of the most popular products queries. Our experimental results show significant improvement, in terms of user satisfaction and relevancy, in comparison

Loud and clear: Human-verifiable authentication based on audio

by Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun - In ICDCS ’06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems , 2006
"... Authentication of communication channels between devices that lack any previous association is an challenging problem. It has been considered in many contexts and in various flavors, most recently, by McCune et al., where human-assisted device authentication is achieved through the use of photo came ..."
Abstract - Cited by 118 (6 self) - Add to MetaCart
cameras (present in some cellphones) and 2-dimensional barcodes. Their proposed Seeing-is-Believing system allows users with devices equipped with cameras to use the visual channel for authentication of unfamiliar devices, so as to defeat man-inthe-middle attacks. In this paper, we investigate

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork

by Xavier Boyen , Brent Waters - CRYPTO 2006. LNCS, , 2006
"... Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract - Cited by 119 (10 self) - Add to MetaCart
that e(g r ,ĝ s ) = e(g,ĝ) r s . Here, G,Ĝ, and G T are all multiplicative groups of prime order p, respectively generated by g,ĝ, and e(g,ĝ). We assume an efficient generation procedure that on input a security parameter Σ ∈ N outputs G $ ← Gen(1 Σ ) where log 2 (p) = Θ(Σ). We write Z p = Z

ADAPTING C2 TO THE 21ST CENTURY Impact of Network Performance on the C2 Mission: Visualization for Network Awareness Topic: Cognitive and Social Issues

by Brian P. Mckenna, James W. Gualtieri, William C. Elm
"... The transfer of intelligence related data is occurring over larger and larger computer networks. In these networks, data are exposed to choke points and dropped nodes, where they can be delayed or lost, impacting the larger intelligence mission. As the command center is the end user of this informat ..."
Abstract - Add to MetaCart
design principles used in this visualization are discussed as a means of enabling their use by other C2 decision support designers.
Next 10 →
Results 1 - 10 of 1,119
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University