Sciweavers

1270 search results - page 78 / 254
» IF Validation Environment Tutorial
Sort
View
TVCG
2012
187views Hardware» more  TVCG 2012»
12 years 22 days ago
Effective Replays and Summarization of Virtual Experiences
—Direct replays of the experience of a user in a virtual environment are difficult for others to watch due to unnatural camera motions. We present methods for replaying and summ...
Kevin Ponto, Joe Kohlmann, Michael Gleicher
IEEESCC
2009
IEEE
14 years 5 months ago
Service Composition Based on Natural Language Requests
—The easiest way for a user to express his needs regarding a desired service is to use natural language. The main issues come from the fact that the natural language is incomplet...
Marcel Cremene, Jean-Yves Tigli, Stephane Lavirott...
ICDCS
2007
IEEE
14 years 4 months ago
Resilient Cluster Formation for Sensor Networks
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
Donggang Liu
IWIA
2005
IEEE
14 years 3 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
EVOW
2003
Springer
14 years 3 months ago
On the Development of Critics in Evolutionary Computation Artists
One of the problems in the use of evolutionary computer systems in artistic tasks is the lack of artificial models of human critics. In this paper, based on the state of the art an...
Juan Romero, Penousal Machado, Antonino Santos, Am...