Sciweavers

2016 search results - page 381 / 404
» 3D Capture for Computer Graphics
Sort
View
ISI
2005
Springer
14 years 1 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
3DIM
2003
IEEE
14 years 1 months ago
Automatic Modeling of Animatable Virtual Humans - A Survey
Highly realistic virtual human models are rapidly becoming commonplace in computer graphics. These models, often represented by complex shape and requiring labor-intensive process...
Nadia Magnenat-Thalmann, Hyewon Seo, Frederic Cord...
HICSS
1999
IEEE
96views Biometrics» more  HICSS 1999»
14 years 3 days ago
Distributed Research Teams: Meeting Asynchronously in Virtual Space
As computer networks improve, more social and work interactions are carried out "virtually" by geographically separated group members. In this paper we discuss the desig...
Lia Adams, Lori Toomey, Elizabeth F. Churchill
VL
1996
IEEE
157views Visual Languages» more  VL 1996»
13 years 12 months ago
Visualizing Program Executions on Large Data Sets
Understanding and interpreting a large data source is an important but challenging operation in many technical disciplines. Computer visualization has become a valuable tool to he...
John T. Stasko, Jeyakumar Muthukumarasamy
NIPS
2004
13 years 9 months ago
Validity Estimates for Loopy Belief Propagation on Binary Real-world Networks
We introduce a computationally efficient method to estimate the validity of the BP method as a function of graph topology, the connectivity strength, frustration and network size....
Joris M. Mooij, Hilbert J. Kappen