Sciweavers

844 search results - page 142 / 169
» Safraless Decision Procedures
Sort
View
APGV
2006
ACM
138views Visualization» more  APGV 2006»
13 years 10 months ago
Verification of rendering quality from measured BTFs
One of the most important, still unsolved problems in computer graphics is the generation of predictive imagery, i.e., images that represent perfect renditions of reality. Such pe...
Jan Meseth, Gero Müller, Reinhard Klein, Flor...
CVPR
2006
IEEE
13 years 10 months ago
Locally Linear Models on Face Appearance Manifolds with Application to Dual-Subspace Based Classification
Recently, there has been a flurry of research on face recognition based on multiple images or shots from either a video sequence or an image set. This paper is also such an attemp...
Wei Fan, Dit-Yan Yeung
CONEXT
2008
ACM
13 years 10 months ago
On cooperative settlement between content, transit and eyeball internet service providers
Internet service providers (ISPs) depend on one another to provide global network services. However, the profit-seeking nature of the ISPs leads to selfish behaviors that result i...
Richard T. B. Ma, Dah-Ming Chiu, John C. S. Lui, V...
CP
2008
Springer
13 years 10 months ago
Cost-Based Domain Filtering for Stochastic Constraint Programming
Abstract. Cost-based filtering is a novel approach that combines techniques from Operations Research and Constraint Programming to filter from decision variable domains values that...
Roberto Rossi, Armagan Tarim, Brahim Hnich, Steven...
DSN
2008
IEEE
13 years 10 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu