Sciweavers

2763 search results - page 101 / 553
» The Dangerous 'All' in Specifications
Sort
View
JMM2
2007
125views more  JMM2 2007»
13 years 9 months ago
The Virtuality and Reality of Augmented Reality
— This thesis explores the creative possibilities and implications of Augmented Reality, not just as a specific technology of computer science, but as one of high technologies th...
Jung Yeon Ma, Jong Soo Choi
CGF
2004
86views more  CGF 2004»
13 years 9 months ago
Visualizing Objects with Mirrors
We present an automatic camera and mirrors placement method for visualizing 3D scenes such that complete and nonredundant visibility is guaranteed, as well as highest image resolu...
Ferran Hurtado, Marc Noy, J.-M. Robert, Vera Sacri...
COMCOM
2000
143views more  COMCOM 2000»
13 years 9 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
COLING
2002
13 years 9 months ago
Semiautomatic Labelling of Semantic Features
This paper presents the strategy and design of a highly efficient semiautomatic method for labelling the semantic features of common nouns, using semantic relationships between wo...
Arantza Díaz de Ilarraza Sánchez, Ai...
IJON
2008
133views more  IJON 2008»
13 years 7 months ago
A multi-objective approach to RBF network learning
The problem of inductive supervised learning is discussed in this paper within the context of multi-objective (MOBJ) optimization. The smoothness-based apparent (effective) comple...
Illya Kokshenev, Antônio de Pádua Bra...