Sciweavers

4233 search results - page 816 / 847
» Three Paths to Effectiveness
Sort
View
161
Voted
CGF
2010
168views more  CGF 2010»
15 years 3 months ago
Modeling Complex Unfoliaged Trees from a Sparse Set of Images
We present a novel image-based technique for modeling complex unfoliaged trees. Existing tree modeling tools either require capturing a large number of views for dense 3D reconstr...
Luis D. Lopez, Yuanyuan Ding, Jingyi Yu
155
Voted
CGF
2008
118views more  CGF 2008»
15 years 3 months ago
Exploratory Visualization of Animal Kinematics Using Instantaneous Helical Axes
We present novel visual and interactive techniques for exploratory visualization of animal kinematics using instantaneous helical axes (IHAs). The helical axis has been used in or...
Daniel F. Keefe, Trevor M. O'Brien, D. B. Baier, S...
138
Voted
CORR
2010
Springer
186views Education» more  CORR 2010»
15 years 3 months ago
Capacitated Caching Games
Capacitated Caching (CC) Games are motivated by P2P and web caching applications, and involve nodes on a network making strategic choices regarding the content to replicate in the...
Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Na...
106
Voted
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 3 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
139
Voted
CORR
2008
Springer
123views Education» more  CORR 2008»
15 years 3 months ago
Provenance Traces
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due...
James Cheney, Umut A. Acar, Amal Ahmed