Sciweavers

1646 search results - page 275 / 330
» Inlining of Virtual Methods
Sort
View
CIARP
2003
Springer
14 years 1 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
14 years 1 months ago
Learning Biped Locomotion from First Principles on a Simulated Humanoid Robot Using Linear Genetic Programming
We describe the first instance of an approach for control programming of humanoid robots, based on evolution as the main adaptation mechanism. In an attempt to overcome some of th...
Krister Wolff, Peter Nordin
AFRIGRAPH
2010
ACM
14 years 1 months ago
Adaptive LOD editing of quad meshes
We present a method for editing the LOD of quad meshes, which supports both adaptive refinement and adaptive coarsening. Starting at a base mesh, we generate a quad-dominant mesh...
Daniele Panozzo, Enrico Puppo
ICPADS
2002
IEEE
14 years 1 months ago
Experiences in Building a Scalable Distributed Network Emulation System
Network emulation systems are widely used to explore the behavior of network protocols and to test and evaluate protocol implementations and applications. The major problem of net...
Pei Zheng, Lionel M. Ni
VISUALIZATION
2002
IEEE
14 years 1 months ago
QuadTIN: Quadtree based Triangulated Irregular Networks
Interactive visualization of large digital elevation models is of continuing interest in scientific visualization, GIS, and virtual reality applications. Taking advantage of the r...
Renato Pajarola, Marc Antonijuan, Roberto Lario