Sciweavers

21342 search results - page 4013 / 4269
» A Structured Language Model
Sort
View
VR
1999
IEEE
189views Virtual Reality» more  VR 1999»
15 years 6 months ago
Cloning and Aging in a VR Family
Face cloning and animation considering wrinkle formation and aging are an aspiring goal and a challenging task. This paper describes a cloning method and an aging simulation in a ...
Won-Sook Lee, Yin Wu, Nadia Magnenat-Thalmann
116
Voted
ICIAP
1999
ACM
15 years 6 months ago
Bayesian Graph Edit Distance
ÐThis paper describes a novel framework for comparing and matching corrupted relational graphs. The paper develops the idea of edit-distance originally introduced for graph-matchi...
Richard Myers, Richard C. Wilson, Edwin R. Hancock
115
Voted
ICSE
1999
IEEE-ACM
15 years 6 months ago
Using Off-the-Shelf Middleware to Implement Connectors in Distributed Software Architectures
Software architectures promote development focused on modular building blocks and their interconnections. Since architecture-level components often contain complex functionality, ...
Eric M. Dashofy, Nenad Medvidovic, Richard N. Tayl...
IH
1999
Springer
15 years 6 months ago
On the Design of a Watermarking System: Considerations and Rationales
This paper summarizes considerations and rationales for the design of a watermark detector. In particular, we relate watermark detection to the problem of signal detection in the p...
Jean-Paul M. G. Linnartz, Geert Depovere, Ton Kalk...
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 6 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
« Prev « First page 4013 / 4269 Last » Next »