Sciweavers

1663 search results - page 295 / 333
» Computer Security in the Real World
Sort
View
144
Voted
NIME
2005
Springer
129views Music» more  NIME 2005»
15 years 9 months ago
Network Latency Adaptive Tempo in the Public Sound Objects System
In recent years Computer Network-Music has increasingly captured the attention of the Computer Music Community. With the advent of Internet communication, geographical displacemen...
Alvaro Barbosa, Jorge Cardoso, Gunter Geiger
134
Voted
RT
2005
Springer
15 years 9 months ago
A Dual Light Stage
We present a technique for capturing high-resolution 4D reflectance fields using the reciprocity property of light transport. In our technique we place the object inside a diffu...
Tim Hawkins, Per Einarsson, Paul E. Debevec
120
Voted
ASM
2004
ASM
15 years 9 months ago
Observations on the Decidability of Transitions
Consider a multiple-agent transition system such that, for some basic types T1, . . . , Tn, the state of any agent can be represented as an element of the Cartesian product T1 ×·...
Yuri Gurevich, Rostislav Yavorskiy
122
Voted
AISB
1994
Springer
15 years 7 months ago
Formal Memetic Algorithms
Abstract. A formal, representation-independent form of a memetic algorithm-a genetic algorithm incorporating local search--is introduced. A generalisedform of N-point crossover is ...
Nicholas J. Radcliffe, Patrick D. Surry
134
Voted
SIGGRAPH
1993
ACM
15 years 7 months ago
Radioptimization: goal based rendering
This paper presents a method for designing the illumination in an environment using optimization techniques applied to a radiosity based image synthesis system. An optimization of...
John K. Kawai, James S. Painter, Michael F. Cohen