Sciweavers

425 search results - page 48 / 85
» Requirements, specifications, and minimal refinement
Sort
View
RT
2000
Springer
13 years 11 months ago
Metropolis Light Transport for Participating Media
Abstract. In this paper we show how Metropolis Light Transport can be extended both in the underlying theoretical framework and the algorithmic implementation to incorporate volume...
Mark Pauly, Thomas Kollig, Alexander Keller
GVD
2001
142views Database» more  GVD 2001»
13 years 9 months ago
An approach to the model-based fragmentation and relational storage of XML-documents
A flexible method to store XML documents in relational or object-relational databases is presented that is based on an adaptable fragmentation. Whereas most known approaches decom...
Christian Süß
NIPS
1992
13 years 8 months ago
Hidden Markov Model} Induction by Bayesian Model Merging
This paper describes a technique for learning both the number of states and the topologyof Hidden Markov Models from examples. The inductionprocess starts with the most specific m...
Andreas Stolcke, Stephen M. Omohundro
CONSTRAINTS
2008
70views more  CONSTRAINTS 2008»
13 years 7 months ago
Reformulating Table Constraints using Functional Dependencies - An Application to Explanation Generation
We present a novel approach to automatically reformulating constraints defined as tables of allowed assignments to variables. Constraints of this form are common in a variety of se...
Hadrien Cambazard, Barry O'Sullivan
IJNSEC
2008
110views more  IJNSEC 2008»
13 years 7 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis