Sciweavers

201 search results - page 23 / 41
» A Linear-System Operator Based Scheme for Evaluation of Mult...
Sort
View
WSCG
2004
152views more  WSCG 2004»
13 years 8 months ago
Stable Cloth Animation with Adaptive Level of Detail
Cloth simulation is a highly intensive processor task. Higher details are often traded or sacrificed for speed in order to maintain the simulation at reasonable rates. This articl...
Fernando Pedro Birra, Manuel Próspero dos S...
ASPLOS
2006
ACM
13 years 9 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 7 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...
ICCV
2005
IEEE
14 years 1 months ago
Learning the Probability of Correspondences without Ground Truth
We present a quality assessment procedure for correspondence estimation based on geometric coherence rather than ground truth. The procedure can be used for performance evaluation...
Qingxiong Yang, R. Matt Steele, David Nisté...
ESOP
2001
Springer
13 years 12 months ago
Modeling an Algebraic Stepper
Programmers rely on the correctness of the tools in their programming environments. In the past, semanticists have studied the correctness of compilers and compiler analyses, which...
John Clements, Matthew Flatt, Matthias Felleisen