Sciweavers

6770 search results - page 1030 / 1354
» How GPUs Work
Sort
View
AAAI
2012
13 years 5 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
147
Voted
CIKM
2007
Springer
15 years 8 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
106
Voted
CVPR
2007
IEEE
16 years 4 months ago
On Constructing Facial Similarity Maps
Automatically determining facial similarity is a difficult and open question in computer vision. The problem is complicated both because it is unclear what facial features humans ...
Alex Holub, Yun-hsueh Liu, Pietro Perona
232
Voted
ICDE
2008
IEEE
142views Database» more  ICDE 2008»
16 years 4 months ago
An Inflationary Fixed Point Operator in XQuery
ct The backbone of the XML data model, namely ordered, unranked trees, is inherently recursive and it is natural to equip the associated languages with constructs that can query su...
Loredana Afanasiev, Torsten Grust, Maarten Marx, J...
161
Voted
MICCAI
2003
Springer
16 years 3 months ago
Real-Time Synthesis of Bleeding for Virtual Hysteroscopy
In this paper we present a method for simulating bleeding in a virtual reality hysteroscopic simulator for surgical training. The simulated bleeding is required to be visually app...
János Zátonyi, Rupert Paget, G&aacut...
« Prev « First page 1030 / 1354 Last » Next »