Sciweavers

2874 search results - page 546 / 575
» Intrusion Detection: Systems and Models
Sort
View
SIGGRAPH
1998
ACM
14 years 2 months ago
Subdivision Surfaces in Character Animation
The creation of believable and endearing characters in computer graphics presents a number of technical challenges, including the modeling, animation and rendering of complex shap...
Tony DeRose, Michael Kass, Tien Truong
FTRTFT
1998
Springer
14 years 2 months ago
On the Need for Practical Formal Methods
A controversial issue in the formal methods community is the degree to which mathematical sophistication and theorem proving skills should be needed to apply a formal method. A fun...
Constance L. Heitmeyer
FGR
2008
IEEE
264views Biometrics» more  FGR 2008»
13 years 11 months ago
Large scale learning and recognition of faces in web videos
The phenomenal growth of video on the web and the increasing sparseness of meta information associated with it forces us to look for signals from the video content for search/info...
Ming Zhao 0003, Jay Yagnik, Hartwig Adam, David Ba...
BMCBI
2007
95views more  BMCBI 2007»
13 years 10 months ago
Methods for estimating human endogenous retrovirus activities from EST databases
Background: Human endogenous retroviruses (HERVs) are surviving traces of ancient retrovirus infections and now reside within the human DNA. Recently HERV expression has been dete...
Merja Oja, Jaakko Peltonen, Jonas Blomberg, Samuel...
CGO
2008
IEEE
14 years 4 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss