Search
Now showing items 3821-3830 of 4210
Identification and reconstruction of bullets from multiple x-rays
(2004)
The 3D shape and position of objects inside the human body are commonly detected using Computed Tomography (CT) scanning. CT is an expensive diagnostic option in economically disadvantaged areas and the radiation dose ...
Intelligent detection of anomalies in telecommunications customer behaviour
(2006)
In this research, we present a modelling technique that can efficiently facilitate anomaly detection that will help call analysts and managers with adaptive decision-making. We developed and implemented a Data 'fransformation ...
Scalable attack modelling in support of security information and event management
(2014)
While assessing security on single devices can be performed using vulnerability assessment tools, modelling of more intricate attacks, which incorporate multiple steps on different machines, requires more advanced techniques. ...
A hardware testbed for measuring IEEE 802.11g DCF performance
(2009)
The Distributed Coordination Function (DCF) is the oldest and most widely-used IEEE 802.11 contention-based channel access control protocol. DCF adds a significant amount of overhead in the form of preambles, frame headers, ...
Lattice Boltzmann liquid simulations on graphics hardware
(2014)
Fluid simulation is widely used in the visual effects industry. The high level of detail required to produce realistic visual effects requires significant computation. Usually, expensive computer clusters are used in order ...
Real-time generation of procedural forests
(2013)
The creation of 3D models for games and simulations is generally a time-consuming and labour intensive task. Forested landscapes are an important component of many large virtual environments in games and film. To create ...
Distributed shared memory for virtual environments
(1997)
This work investigated making virtual environments easier to program, by designing a suitable distributed shared memory system. To be usable, the system must keep latency to a minimum, as virtual environments are very ...
Visualizing the memory performance of parallel programs with Chiron
(1996)
This thesis describes Chiron, visualization system which helps programmers detect memory system bottlenecks in their shared-memory parallel applications. Chiron is different from most other performance debugging tools in ...
Bottom-up evaluation of HiLog in the context of deductive database systems
(1998)
HiLog is a logic-based language which boasts the expressiveness of a higher-order syntax while retaining the simplicity of a first-order semantics. This work examines the suitability of Horn-clause HiLog as a query language ...
High-level control of agent-based crowds by means of general constraints
(2009)
The use of computer-generated crowds in visual effects has grown tremendously since the warring armies of virtual ores and elves were seen in The Lord of the Rings. These crowds are generated by agent-based simulations, ...