Sciweavers

1663 search results - page 295 / 333
» Computer Security in the Real World
Sort
View
NIME
2005
Springer
129views Music» more  NIME 2005»
15 years 7 months ago
Network Latency Adaptive Tempo in the Public Sound Objects System
In recent years Computer Network-Music has increasingly captured the attention of the Computer Music Community. With the advent of Internet communication, geographical displacemen...
Alvaro Barbosa, Jorge Cardoso, Gunter Geiger
RT
2005
Springer
15 years 7 months ago
A Dual Light Stage
We present a technique for capturing high-resolution 4D reflectance fields using the reciprocity property of light transport. In our technique we place the object inside a diffu...
Tim Hawkins, Per Einarsson, Paul E. Debevec
ASM
2004
ASM
15 years 7 months ago
Observations on the Decidability of Transitions
Consider a multiple-agent transition system such that, for some basic types T1, . . . , Tn, the state of any agent can be represented as an element of the Cartesian product T1 ×·...
Yuri Gurevich, Rostislav Yavorskiy
AISB
1994
Springer
15 years 6 months ago
Formal Memetic Algorithms
Abstract. A formal, representation-independent form of a memetic algorithm-a genetic algorithm incorporating local search--is introduced. A generalisedform of N-point crossover is ...
Nicholas J. Radcliffe, Patrick D. Surry
SIGGRAPH
1993
ACM
15 years 6 months ago
Radioptimization: goal based rendering
This paper presents a method for designing the illumination in an environment using optimization techniques applied to a radiosity based image synthesis system. An optimization of...
John K. Kawai, James S. Painter, Michael F. Cohen