Sciweavers

5544 search results - page 1055 / 1109
» Three Inadequate Models
Sort
View
ICRE
2000
IEEE
14 years 1 days ago
Scenario Evolution: A Closer View on Relationships
In this article we show the results of an extensive research on scenario evolution. We investigated twelve case studies spanning over 200 scenarios that contained over 800 episode...
Karin Breitman, Julio Cesar Sampaio do Prado Leite
SIGGRAPH
2000
ACM
14 years 17 hour ago
As-rigid-as-possible shape interpolation
We present an object-space morphing technique that blends the interiors of given two- or three-dimensional shapes rather than their boundaries. The morph is rigid in the sense tha...
Marc Alexa, Daniel Cohen-Or, David Levin
SIGMETRICS
2000
ACM
101views Hardware» more  SIGMETRICS 2000»
14 years 16 hour ago
On achievable service differentiation with token bucket marking for TCP
The Differentiated services (diffserv) architecture has been proposed as a scalable solution for providing service differentiation among flows without any per-flow buffer manage...
Sambit Sahu, Philippe Nain, Christophe Diot, Victo...
ECOOP
2000
Springer
14 years 2 hour ago
Copying and Comparing: Problems and Solutions
In object oriented programming, it is sometimes necessary to copy objects and to compare them for equality or inequality. We discuss some of the issues involved in copying and comp...
Peter Grogono, Markku Sakkinen
SIGGRAPH
1999
ACM
13 years 12 months ago
Direct Illumination with Lazy Visibility Evaluation
In this paper we present a technique for computing the direct lighting in a three-dimensional scene containing area light sources. Our method correctly handles partial visibility ...
David Hart, Philip Dutré, Donald P. Greenbe...
« Prev « First page 1055 / 1109 Last » Next »