Sciweavers

1775 search results - page 265 / 355
» Antichains on Three Levels
Sort
View
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 9 months ago
Database Privacy
The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal data, rather than on confidentiality alone. This balance ...
Martin S. Olivier
TOG
2002
162views more  TOG 2002»
13 years 9 months ago
Interactive skeleton-driven dynamic deformations
This paper presents a framework for the skeleton-driven animation of elastically deformable characters. A character is embedded in a coarse volumetric control lattice, which provi...
Steve Capell, Seth Green, Brian Curless, Tom Ducha...
TPDS
2002
126views more  TPDS 2002»
13 years 9 months ago
P-3PC: A Point-to-Point Communication Model for Automatic and Optimal Decomposition of Regular Domain Problems
One of the most fundamental problems automatic parallelization tools are confronted with is to find an optimal domain decomposition for a given application. For regular domain prob...
Frank J. Seinstra, Dennis Koelma
TSE
2002
94views more  TSE 2002»
13 years 9 months ago
Behavior Protocols for Software Components
In this paper, we propose a means to enhance an architecture description language with a description of component behavior. A notation used for this purpose should be able to expr...
Frantisek Plasil, Stanislav Visnovsky
PAMI
2007
106views more  PAMI 2007»
13 years 9 months ago
From Template to Image: Reconstructing Fingerprints from Minutiae Points
—Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not r...
Arun Ross, Jidnya Shah, Anil K. Jain