scispace - formally typeset
Search or ask a question
Topic

Representation (systemics)

About: Representation (systemics) is a research topic. Over the lifetime, 33821 publications have been published within this topic receiving 475461 citations.


Papers
More filters
Patent
25 Aug 2005
TL;DR: In this paper, a method for managing a plurality of application window representations is described, which includes steps of defining a set of application windows representation positions in a predefined region, displaying the plurality of window representations in the application window representation positions, receiving an input to open a first application window, creating a first window representation in the pre-defined region, determining whether a second window representation of the plurality needs to be repositioned into a hidden application window position, and repositioning the second application window representing the plurality to fit into the hidden representation.
Abstract: A method for managing a plurality of application window representations is described. The method includes steps of defining a set of application window representation positions in a predefined region, displaying a plurality of application window representations in the application window representation positions, receiving an input to open a first application window, creating a first application window representation in the predefined region, determining whether a second application window representation of the plurality needs to be repositioned into a hidden application window representation position, and repositioning the second application window representation into the hidden application window representation upon determining that the second application window representation needs to be repositioned, wherein the hidden application window representation position is within a glom.

215 citations

Journal ArticleDOI

214 citations

Patent
09 Feb 1999
TL;DR: In this article, the authors proposed a scheme for secure digital representation distribution that combines encryption and watermarking, where a user at a client wants to download a digital representation, and the user makes a request to a server for the digital representation.
Abstract: Techniques for secure distribution of digital representations that combine encryption and watermarking. When a user at a client desires to download a digital representation, the user makes a request to a server for the digital representation, which encrypts the digital representation using a first key and downloads the encrypted digital representation to the user. Before the user performs any operation on the decrypted digital representation, a secret fingerprint watermark identifying the user is added to the digital representation. The fingerprint watermark is added either at the server or at the client and a copy of the fingerprinted digital representation is kept at the server. If the user makes an impermissible use of the digital representation, the secret fingerprint watermark can be used to identify the user. The request made by the user indicates the type of use that the user whished to make of the digital representation. If the use involves storage of the digital representation at the client, the server provides a second key that the client employs to encrypt the digital representation. If the user has permission to do so, the user may modify the digital representation and return the modified digital representation to the server for further distribution. In this case, the second key is used to encrypt the digital representation when it is sent to the server. The second key also serves as the user identification in the fingerprint watermark. If the user loses the second key, it can be recovered from the copy of the fingerprinted digital representation kept at the server. The first and second keys and any decrypted copy of the digital representation are kept in secure storage in the client.

214 citations

Patent
08 Oct 1999
TL;DR: In this article, the authors fit a set of upper and lower teeth in a masticatory system by generating a computer representation of the masticator system and computing an occlusion based on interactions in the computer representation.
Abstract: Methods and apparatus fit a set of upper and lower teeth in a masticatory system by generating a computer representation of the masticatory system and computing an occlusion based on interactions in the computer representation of the masticatory system.

214 citations

Journal ArticleDOI
TL;DR: In this paper, the Percus-Yevick hard-sphere radial distribution function, g(R), for R ˇ-5σ is analyzed in terms of complex variables.
Abstract: Explicit analytical expressions, written in terms of complex variables and suitable for rapid computer evaluation, are presented for the Percus-Yevick hard-sphere radial distribution function, g(R), for R ˇ- 5σ. Some effects of truncating g(R) to unity past R = 5 σ are discussed.

213 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202225
20211,580
20201,876
20191,935
20181,792
20171,391