Results 1 - 10
of
1,119
PETSc users manual
- ANL-95/11 - Revision 2.1.0, Argonne National Laboratory
, 2001
"... tract W-31-109-Eng-38. 2 This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Compu-tation (PETSc) is a suite of data structures and routines that provid ..."
Abstract
-
Cited by 282 (20 self)
- Add to MetaCart
tract W-31-109-Eng-38. 2 This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Compu-tation (PETSc) is a suite of data structures and routines
3-D Sound for Virtual Reality and Multimedia
, 2000
"... This paper gives HRTF magnitude data in numerical form for 43 frequencies between 0.2---12 kHz, the average of 12 studies representing 100 different subjects. However, no phase data is included in the tables; group delay simulation would need to be included in order to account for ITD. In 3-D sound ..."
Abstract
-
Cited by 290 (5 self)
- Add to MetaCart
This paper gives HRTF magnitude data in numerical form for 43 frequencies between 0.2---12 kHz, the average of 12 studies representing 100 different subjects. However, no phase data is included in the tables; group delay simulation would need to be included in order to account for ITD. In 3-D sound
The instructive animation: Helping students build connections between words and pictures in multimedia learning
- Journal of Educational Psychology
, 1992
"... In 2 experiments, students studied an animation depicting the operation of a bicycle tire pump or an automobile braking system, along with concurrent oral narration of the steps in the process (concurrent group), successive presentation of animation and narration (by 4 different methods), animation ..."
Abstract
-
Cited by 175 (15 self)
- Add to MetaCart
In 2 experiments, students studied an animation depicting the operation of a bicycle tire pump or an automobile braking system, along with concurrent oral narration of the steps in the process (concurrent group), successive presentation of animation and narration (by 4 different methods), animation
Can ISPs and P2P users cooperate for improved performance
- ACM SIGCOMM Computer Communication Review
, 2007
"... This paper addresses the antagonistic relationship between overlay/p2p networks and IPS providers: they both try to manage and control traffic at different level and with different goals, but in a way that inevitably leads to overlapping, duplicated, and conflicting behavior. The creation of a p2p n ..."
Abstract
-
Cited by 120 (5 self)
- Add to MetaCart
This paper addresses the antagonistic relationship between overlay/p2p networks and IPS providers: they both try to manage and control traffic at different level and with different goals, but in a way that inevitably leads to overlapping, duplicated, and conflicting behavior. The creation of a p2p
Visually Impaired Users
"... We investigated two solutions for numerical (2D) tabular data discovery and overview for visually impaired and blind users. One involved accessing information in tables (26 rows x 10 columns containing integers between and including 0 and 100) by this target user group using both speech and non-spee ..."
Abstract
- Add to MetaCart
We investigated two solutions for numerical (2D) tabular data discovery and overview for visually impaired and blind users. One involved accessing information in tables (26 rows x 10 columns containing integers between and including 0 and 100) by this target user group using both speech and non
Choosing Effective Colours for Data Visualization
- Proc. Seventh IEEE Conf. Visualization (VIS ’96
, 1996
"... In this paper we describe a technique for choosing multiple colours for use during data visualization. Our goal is a systematic method for maximizing the total number of colours available for use, while still allowing an observer to rapidly and accurately search a display for any one of the given co ..."
Abstract
-
Cited by 99 (13 self)
- Add to MetaCart
visualization. CR Descriptors: H.5.2 [Information Interfaces and Presentation]: User Interfaces- ergonomics, screen design (graphics,
Visual Rank: applying Page Rank to large-scale image search
- IEEE Trans. Pattern Analysis and Machine Intelligence
, 2008
"... Abstract—Because of the relative ease in understanding and processing text, commercial image-search systems often rely on techniques that are largely indistinguishable from text search. Recently, academic studies have demonstrated the effectiveness of employing image-based features to provide either ..."
Abstract
-
Cited by 96 (4 self)
- Add to MetaCart
the performance of such an approach in a real system, we conducted a series of large-scale experiments based on the task of retrieving images for 2,000 of the most popular products queries. Our experimental results show significant improvement, in terms of user satisfaction and relevancy, in comparison
Loud and clear: Human-verifiable authentication based on audio
- In ICDCS ’06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
, 2006
"... Authentication of communication channels between devices that lack any previous association is an challenging problem. It has been considered in many contexts and in various flavors, most recently, by McCune et al., where human-assisted device authentication is achieved through the use of photo came ..."
Abstract
-
Cited by 118 (6 self)
- Add to MetaCart
cameras (present in some cellphones) and 2-dimensional barcodes. Their proposed Seeing-is-Believing system allows users with devices equipped with cameras to use the visual channel for authentication of unfamiliar devices, so as to defeat man-inthe-middle attacks. In this paper, we investigate
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork
- CRYPTO 2006. LNCS,
, 2006
"... Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract
-
Cited by 119 (10 self)
- Add to MetaCart
that e(g r ,ĝ s ) = e(g,ĝ) r s . Here, G,Ĝ, and G T are all multiplicative groups of prime order p, respectively generated by g,ĝ, and e(g,ĝ). We assume an efficient generation procedure that on input a security parameter Σ ∈ N outputs G $ ← Gen(1 Σ ) where log 2 (p) = Θ(Σ). We write Z p = Z
ADAPTING C2 TO THE 21ST CENTURY Impact of Network Performance on the C2 Mission: Visualization for Network Awareness Topic: Cognitive and Social Issues
"... The transfer of intelligence related data is occurring over larger and larger computer networks. In these networks, data are exposed to choke points and dropped nodes, where they can be delayed or lost, impacting the larger intelligence mission. As the command center is the end user of this informat ..."
Abstract
- Add to MetaCart
design principles used in this visualization are discussed as a means of enabling their use by other C2 decision support designers.
Results 1 - 10
of
1,119