Sciweavers

9359 search results - page 1777 / 1872
» Generalization Algorithms for Second-Order Terms
Sort
View
SMA
2003
ACM
173views Solid Modeling» more  SMA 2003»
14 years 1 months ago
Automating the CAD/CAE dimensional reduction process
Dimensional reduction is a simplification technique that eliminates one or more dimensions from a boundary value problem. It results in significant computational savings with mini...
Krishnan Suresh
VRML
2003
ACM
14 years 1 months ago
3D virtual clothing: from garment design to web3d visualization and simulation
One of the major challenges in Computer Graphics concerns the 3D representation and physically-based simulation of garments. In our research, we are working closely with the texti...
Luca Chittaro, Demis Corvaglia
VRST
2003
ACM
14 years 1 months ago
Tele-sports and tele-dance: full-body network interaction
Researchers have had great success using motion capture tools for controlling avatars in virtual worlds. Another current of virtual reality research has focused on building collab...
Benjamin Schaeffer, Mark Flider, Hank Kaczmarski, ...
WPES
2003
ACM
14 years 1 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
WSNA
2003
ACM
14 years 1 months ago
Information assurance in sensor networks
Sensor networks are deployed to monitor the surroundings and keep the end-user informed about the events witnessed. Different types of events have different levels of importance f...
Budhaditya Deb, Sudeept Bhatnagar, Badri Nath
« Prev « First page 1777 / 1872 Last » Next »