Sciweavers

1610 search results - page 278 / 322
» Identity Based Multisignatures
Sort
View
CGF
2004
122views more  CGF 2004»
13 years 9 months ago
Exchanging Faces in Images
Pasting somebody's face into an existing image with traditional photo retouching and digital image processing tools has only been possible if both images show the face from t...
Volker Blanz, Kristina Scherbaum, Thomas Vetter, H...
CONSTRAINTS
2011
13 years 4 months ago
Dantzig-Wolfe decomposition and branch-and-price solving in G12
Abstract The G12 project is developing a software environment for stating and solving combinatorial problems by mapping a high-level model of the problem to an efficient combinatio...
Jakob Puchinger, Peter J. Stuckey, Mark G. Wallace...
CORR
2011
Springer
155views Education» more  CORR 2011»
13 years 4 months ago
Subexponential convergence for information aggregation on regular trees
— We consider the decentralized binary hypothesis testing problem on trees of bounded degree and increasing depth. For a regular tree of depth t and branching factor k ≥ 2, we ...
Yashodhan Kanoria, Andrea Montanari
CSCW
2011
ACM
13 years 4 months ago
Me and my avatar: exploring users' comfort with avatars for workplace communication
This paper describes results from a large-scale survey to explore users’ comfort with different styles of avatars for workplace communication. Thirty-one avatars were evaluated ...
Kori M. Inkpen, Mara Sedlins
ISCI
2011
13 years 4 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni