Sciweavers

1715 search results - page 276 / 343
» Point Sample Rendering
Sort
View
ACSAC
2005
IEEE
14 years 4 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
SI3D
2005
ACM
14 years 4 months ago
Texture sprites: texture elements splatted on surfaces
We present a new interactive method to texture complex geometries at very high resolution, while using little memory and without the need for a global planar parameterization. We ...
Sylvain Lefebvre, Samuel Hornus, Fabrice Neyret
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
14 years 4 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
ECAI
2004
Springer
14 years 4 months ago
A Context-Based Model of Attention
d abstract)1 Niek Bergboer Eric Postma Jaap van den Herik Institute for Knowledge and Agent Technology, Universiteit Maastricht, P.O. Box 616, 6200 MD Maastricht It is well known t...
Niek Bergboer, Eric O. Postma, H. Jaap van den Her...
ECCV
2004
Springer
14 years 4 months ago
Pose Invariant Face Recognition Under Arbitrary Unknown Lighting Using Spherical Harmonics
Abstract. We propose a new method for face recognition under arbitrary pose and illumination conditions, which requires only one training image per subject. Furthermore, no limitat...
Lei Zhang 0002, Dimitris Samaras