Sciweavers

112 search results - page 21 / 23
» Computer science olympiad: exploring computer science throug...
Sort
View
JGAA
2007
124views more  JGAA 2007»
13 years 9 months ago
Simultaneous Border Segmentation of Doughnut-Shaped Objects in Medical Images
Image segmentation with specific constraints has found applications in several areas such as biomedical image analysis and data mining. In this paper, we study the problem of sim...
Xiaodong Wu, Michael B. Merickel

Book
9504views
15 years 6 months ago
The OpenGL Programming Guide - The Redbook
"The OpenGL Programming Guide, Fifth Edition, provides definitive and comprehensive information on OpenGL and the OpenGL Utility Library. The previous edition covered OpenGL t...
Dave Shreiner, Mason Woo, Jackie Neider, Tom Davis
SI3D
1992
ACM
14 years 1 months ago
NPSNET: Constructing a 3D Virtual World
The development of 3D visual simulation systemson inexpensive, commercially available graphics workstations is occurring today and will be commonplace in the near future. Such sys...
Michael Zyda, David R. Pratt, James G. Monahan, Ka...
MOBICOM
2003
ACM
14 years 2 months ago
Towards realistic mobility models for mobile ad hoc networks
One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. Simulation provides researchers with a number...
Amit P. Jardosh, Elizabeth M. Belding-Royer, Kevin...
ATAL
2007
Springer
14 years 3 months ago
Commitment and extortion
Making commitments, e.g., through promises and threats, enables a player to exploit the strengths of his own strategic position as well as the weaknesses of that of his opponents....
Paul Harrenstein, Felix Brandt, Felix A. Fischer