Sciweavers

882 search results - page 112 / 177
» Visibility-driven transfer functions
Sort
View
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 6 months ago
Information Delivery System through Bluetooth in Ubiquitous Networks
------------------------------------------------------ABSTRACT-------------------------------------------------------Ubiquitous and pervasive computing (UPC) is a popular paradigm ...
D. Asha Devi, M. Suresh Bab, V. L. Pavani, N. Geet...
TOG
2012
301views Communications» more  TOG 2012»
11 years 11 months ago
An analytic model for full spectral sky-dome radiance
We present a physically-based analytical model of the daytime sky. Based on the results of a first-principles brute force simulation of radiative transfer in the atmosphere, we u...
Lukas Hosek, Alexander Wilkie
CVPR
2012
IEEE
11 years 11 months ago
Spatial bias in multi-atlas based segmentation
Multi-atlas segmentation has been widely applied in medical image analysis. With deformable registration, this technique realizes label transfer from pre-labeled atlases to unknow...
Hongzhi Wang, Paul A. Yushkevich
NCA
2006
IEEE
13 years 9 months ago
Evolutionary training of hardware realizable multilayer perceptrons
The use of multilayer perceptrons (MLP) with threshold functions (binary step function activations) greatly reduces the complexity of the hardware implementation of neural networks...
Vassilis P. Plagianakos, George D. Magoulas, Micha...
SIGSOFT
2003
ACM
14 years 9 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz