Sciweavers

5544 search results - page 995 / 1109
» Three Inadequate Models
Sort
View
HICSS
1996
IEEE
74views Biometrics» more  HICSS 1996»
14 years 2 months ago
Querying Structured Hyperdocuments
In this paper, we present a document model which integrates the logical structure and hypertext link structure of hyperdocuments in order to manage structured documents with hyper...
Yong Kyu Lee, Seong-Joon Yoo, Kyoungro Yoon, P. Br...
RT
1997
Springer
14 years 2 months ago
Interactive Common Illumination for Computer Augmented Reality
: The advent of computer augmented reality (CAR), in which computer generated objects mix with real video images, has resulted in many interesting new application domains. Providin...
George Drettakis, Luc Robert, Sylvain Bougnoux
COLT
1993
Springer
14 years 2 months ago
Parameterized Learning Complexity
We describe three applications in computational learning theory of techniques and ideas recently introduced in the study of parameterized computational complexity. (1) Using param...
Rodney G. Downey, Patricia A. Evans, Michael R. Fe...
RULES
1993
Springer
134views Database» more  RULES 1993»
14 years 2 months ago
Temporal Rule Specification and Management in Object-oriented Knowledge Bases
There have been many recent research efforts on temporal databases for managing current and historical data and on active databases for monitoring real-world events as well as dat...
Stanley Y. W. Su, Hsin-Hsing M. Chen
SIGGRAPH
1993
ACM
14 years 2 months ago
Hierarchical Z-buffer visibility
An ideal visibility algorithm should a) quickly reject most of the hidden geometry in a model and b) exploit the spatial and perhaps temporal coherence of the images being generat...
Ned Greene, Michael Kass, Gavin S. P. Miller