Sciweavers

89222 search results - page 17798 / 17845
» Which
Sort
View
TOG
2012
232views Communications» more  TOG 2012»
11 years 11 months ago
Discovery of complex behaviors through contact-invariant optimization
We present a motion synthesis framework capable of producing a wide variety of important human behaviors that have rarely been studied, including getting up from the ground, crawl...
Igor Mordatch, Emanuel Todorov, Zoran Popovic
TOG
2012
230views Communications» more  TOG 2012»
11 years 11 months ago
Decoupling algorithms from schedules for easy optimization of image processing pipelines
Using existing programming tools, writing high-performance image processing code requires sacrificing readability, portability, and modularity. We argue that this is a consequenc...
Jonathan Ragan-Kelley, Andrew Adams, Sylvain Paris...
TOG
2012
258views Communications» more  TOG 2012»
11 years 11 months ago
Stitch meshes for modeling knitted clothing with yarn-level detail
ike abstraction of the yarn model; (c) then, we specify the desired knitting pattern over the stitch mesh’s surface. (d) Following the interactive modeling process, the model goe...
Cem Yuksel, Jonathan M. Kaldor, Doug L. James, Ste...
TOG
2012
215views Communications» more  TOG 2012»
11 years 11 months ago
Videoscapes: exploring sparse, unstructured video collections
The abundance of mobile devices and digital cameras with video capture makes it easy to obtain large collections of video clips that contain the same location, environment, or eve...
James Tompkin, Kwang In Kim, Jan Kautz, Christian ...
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
« Prev « First page 17798 / 17845 Last » Next »