Sciweavers

223 search results - page 37 / 45
» pc 2006
Sort
View
FSE
2006
Springer
117views Cryptology» more  FSE 2006»
13 years 11 months ago
How Far Can We Go on the x64 Processors?
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
Mitsuru Matsui
AIIDE
2006
13 years 9 months ago
Normative Echoes: Use and Manipulation of Player Generated Content by Communities of NPCs
Normative Echoes is an interactive installation that explores ways to combine player-created content with procedural content. Animated autonomous agents inhabit virtual islands on...
Eric Baumer, Bill Tomlinson, Man Lok Yau, Thomas A...
CG
2006
Springer
13 years 7 months ago
Shape reasoning and understanding
s: clustering, denoising, sharp feature, shape abstraction, reverse engineering In this paper we describe a hierarchical face clustering algorithm for triangle meshes based on fit...
Bianca Falcidieno, Remco C. Veltkamp
ISM
2006
IEEE
173views Multimedia» more  ISM 2006»
13 years 7 months ago
Automatic Capture of Significant Points in a Computer Based Presentation
We describe an automatic classroom capture system that detects and records significant (stable) points in lectures by sampling and analyzing a sequence of screen capture frames fr...
Paul E. Dickson, W. Richards Adrion, Allen R. Hans...
ML
2006
ACM
142views Machine Learning» more  ML 2006»
13 years 7 months ago
The max-min hill-climbing Bayesian network structure learning algorithm
We present a new algorithm for Bayesian network structure learning, called Max-Min Hill-Climbing (MMHC). The algorithm combines ideas from local learning, constraint-based, and sea...
Ioannis Tsamardinos, Laura E. Brown, Constantin F....