Sciweavers

2799 search results - page 533 / 560
» The regenerator location problem
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 29 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SIGGRAPH
1998
ACM
14 years 29 days ago
Rendering Synthetic Objects into Real Scenes: Bridging Traditional and Image-based Graphics with Global Illumination and High Dy
We present a method that uses measured scene radiance and global illumination in order to add new objects to light-based models with correct lighting. The method uses a high dynam...
Paul E. Debevec
SIGOPSE
1998
ACM
14 years 29 days ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
SMILE
1998
Springer
14 years 28 days ago
Interactive 3D Modeling from Multiple Images Using Scene Regularities
Abstract. We present some recent progress in designing and implementing two interactive image-based 3D modeling systems. The first system constructs 3D models from a collection of ...
Heung-Yeung Shum, Richard Szeliski, Simon Baker, M...
VISUALIZATION
1997
IEEE
14 years 28 days ago
Volume rendering of abdominal aortic aneurysms
Volume rendering is a valuable and important technique for scientific visualization. One well known application area is the reconstruction and visualization of output from medica...
Roger C. Tam, Christopher G. Healey, Borys Flak, P...