Sciweavers

43264 search results - page 8267 / 8653
» Comparing models of computation
Sort
View
135
Voted
VIP
2003
15 years 4 months ago
3D Reconstruction of a Human Face with Monocular Camera Based on Head Movement
Constructing three-dimensional model from two-dimensional images is an old problem in the area of computer vision. There are many publications and our approach is specifically des...
Ben Yip, Jesse S. Jin
VISSYM
2003
15 years 4 months ago
Contouring Curved Quadratic Elements
We show how to extract a contour line (or isosurface) from quadratic elements—specifically from quadratic triangles and tetrahedra. We also devise how to transform the resultin...
David F. Wiley, Henry R. Childs, Benjamin F. Grego...
130
Voted
DOA
2000
169views more  DOA 2000»
15 years 4 months ago
DOORS: Towards High-Performance Fault Tolerant CORBA
An increasing number of applications are being developed using distributed object computing middleware, such as CORBA. Many of these applications require the underlying middleware...
Balachandran Natarajan, Aniruddha S. Gokhale, Shal...
144
Voted
WM
2003
15 years 4 months ago
The differentia principle as a cornerstone of ontology
The Information Society relies more and more on the co-operation and collaboration of multidisciplinary people who need to communicate and share information. Communication and kno...
Christophe Spies
137
Voted
WORM
2003
15 years 4 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
« Prev « First page 8267 / 8653 Last » Next »