ssionism”, (bottom row) “Abstract”, “Pointillism”, “Flower” and “Abstract” styles. Figure 3 shows some of the brush strokes used. We present techniques for trans...
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
We present a simple and linear 3D cellular automata approach for animating the behaviors of viscous flow volumes in virtual environments. An accurate modeling of fluid flow usu...
Critical components of a distributed system must be replicated to achieve high availability and fault tolerance. Current faulttolerant CORBA infrastructures have concentrated on m...
Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith
Numbers: AbstractImageRepresentations Paul Haeberli Silicon Graphics Computer Systems Computer graphics research has concentrated on creating photo-realistic images of synthetic o...