Sciweavers

1116 search results - page 119 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
GRAPHICSINTERFACE
2003
13 years 9 months ago
CInDeR: Collision and Interference Detection in Real-time using graphics hardware
Collision detection is a vital task in almost all forms of computer animation and physical simulation. It is also one of the most computationally expensive, and therefore a freque...
Dave Knott, Dinesh K. Pai
GMP
2008
IEEE
192views Solid Modeling» more  GMP 2008»
13 years 8 months ago
Efficient Collision Detection Using a Dual Bounding Volume Hierarchy
We perform collision detection between static rigid objects using a bounding volume hierarchy which consists of an oriented bounding box (OBB) tree enhanced with bounding spheres. ...
Jung-Woo Chang, Wenping Wang, Myung-Soo Kim
WEBNET
2000
13 years 9 months ago
Developing Web Browser Recording Tools Using Server-Side Programming Technology
: It is always a challenge to present Web applications at a facility with no Internet connection. Traditional presentation methods such as transparencies or slides are inadequate f...
Chris J. Lu, Anantha Bangalore, Tony Tse
SPEECH
2008
124views more  SPEECH 2008»
13 years 7 months ago
Statistical mapping between articulatory movements and acoustic spectrum using a Gaussian mixture model
In this paper, we describe a statistical approach to both an articulatory-to-acoustic mapping and an acoustic-to-articulatory inversion mapping without using phonetic information....
Tomoki Toda, Alan W. Black, Keiichi Tokuda
ISSTA
1998
ACM
14 years 4 days ago
Automatic Test Data Generation Using Constraint Solving Techniques
Automatic test data generation leads to identify input values on which a selected point in a procedure is executed. This paper introduces a new method for this problem based on co...
Arnaud Gotlieb, Bernard Botella, Michel Rueher