Sciweavers

504 search results - page 75 / 101
» Explaining Verification Conditions
Sort
View
SIGGRAPH
1998
ACM
14 years 5 days ago
Recovering Photometric Properties of Architectural Scenes from Photographs
In this paper, we present a new approach to producing photorealistic computer renderings of real architectural scenes under novel lighting conditions, such as at different times o...
Yizhou Yu, Jitendra Malik
BMCBI
2005
145views more  BMCBI 2005»
13 years 7 months ago
CAGER: classification analysis of gene expression regulation using multiple information sources
Background: Many classification approaches have been applied to analyzing transcriptional regulation of gene expressions. These methods build models that can explain a gene's...
Jianhua Ruan, Weixiong Zhang
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
12 years 11 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
CCR
2008
85views more  CCR 2008»
13 years 7 months ago
On cycles in AS relationships
y be more complex than the course modeling abstraction we adopted in [2]. Real AS relationships may depend on a peering point, prefix, and even time [2]. For example, ISPs that dom...
Xenofontas A. Dimitropoulos, M. Ángeles Ser...
SIAMADS
2010
100views more  SIAMADS 2010»
13 years 2 months ago
Optimal Intrinsic Dynamics for Bursting in a Three-Cell Network
Previous numerical and analytical work has shown that synaptic coupling can allow a network of model neurons to synchronize despite heterogeneity in intrinsic parameter values. In ...
Justin R. Dunmyre, Jonathan E. Rubin