Sciweavers

4983 search results - page 901 / 997
» order 2008
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
CGF
2005
204views more  CGF 2005»
13 years 8 months ago
BRDF and geometry capture from extended inhomogeneous samples using flash photography
We present a technique which allows capture of 3D surface geometry and a useful class of BRDFs using extremely simple equipment. A standard digital camera with an attached flash s...
James A. Paterson, David Claus, Andrew W. Fitzgibb...
CGF
2005
111views more  CGF 2005»
13 years 8 months ago
Hierarchyless Simplification, Stripification and Compression of Triangulated Two Manifolds
In this paper we explore the algorithmic space in which stripification, simplification and geometric compression of triangulated 2-manifolds overlap. Edge-collase/uncollapse based...
Pablo Diaz-Gutierrez, Meenakshisundaram Gopi, Rena...
CGF
2005
94views more  CGF 2005»
13 years 8 months ago
Morphology-independent representation of motions for interactive human-like animation
This paper addresses the problem of human motion encoding for real-time animation in interactive environments. Classically, a motion is stored as a sequence of body postures encod...
Richard Kulpa, Franck Multon, Bruno Arnaldi
TSE
2008
165views more  TSE 2008»
13 years 8 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han