Sciweavers

1594 search results - page 194 / 319
» Sampling and Reconstruction of Operators
Sort
View
3DIM
1999
IEEE
14 years 1 months ago
An Automation System for Industrial 3-D Laser Digitizing
An architecture and prototype implementation of an automation system for industrial 3-D digitization is described. Facilities for automated view planning, collision avoidance and ...
D. G. Lamb, D. L. Baird, Michael A. Greenspan
SIGGRAPH
1989
ACM
14 years 1 months ago
A general two-pass method integrating specular and diffuse reflection
We analyse some recent approaches to the global illumination problem by introducing the corresponding reflection operators, and we demonstrate the advantages of a two-pass method....
François X. Sillion, Claude Puech
AAAI
2008
13 years 11 months ago
Efficient Learning of Action Schemas and Web-Service Descriptions
This work addresses the problem of efficiently learning action schemas using a bounded number of samples (interactions with the environment). We consider schemas in two languages-...
Thomas J. Walsh, Michael L. Littman
USENIX
2003
13 years 10 months ago
ASK: Active Spam Killer
We present Active Spam Killer (ASK), a program that attempts to validate unknown senders before allowing delivery of their message. Validation occurs by means of a challenge reply...
Marco Paganini
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
13 years 7 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov