Sciweavers

298 search results - page 54 / 60
» Computer security: quality rather than quantity
Sort
View
SIGGRAPH
1998
ACM
14 years 24 days ago
Painterly Rendering with Curved Brush Strokes of Multiple Sizes
We present a new method for creating an image with a handpainted appearance from a photograph, and a new approach to designing styles of illustration. We “paint” an image with...
Aaron Hertzmann
BMCBI
2004
208views more  BMCBI 2004»
13 years 8 months ago
Using 3D Hidden Markov Models that explicitly represent spatial coordinates to model and compare protein structures
Background: Hidden Markov Models (HMMs) have proven very useful in computational biology for such applications as sequence pattern matching, gene-finding, and structure prediction...
Vadim Alexandrov, Mark Gerstein
CVPR
2005
IEEE
14 years 10 months ago
Bi-Layer Segmentation of Binocular Stereo Video
This paper describes two algorithms capable of real-time segmentation of foreground from background layers in stereo video sequences. Automatic separation of layers from colour/co...
Vladimir Kolmogorov, Antonio Criminisi, Andrew Bla...
GI
1997
Springer
14 years 4 days ago
Persistent Object Systems: From Technology to Market
Abstract. This text describes how persistent object system technology developed in European basic research is being used by a small German startup software company to realize innov...
Andreas Gawecki, Florian Matthes, Joachim W. Schmi...
GECCO
2008
Springer
114views Optimization» more  GECCO 2008»
13 years 9 months ago
Strategic positioning in tactical scenario planning
Capability planning problems are pervasive throughout many areas of human interest with prominent examples found in defense and security. Planning provides a unique context for op...
James M. Whitacre, Hussein A. Abbass, Ruhul A. Sar...