Sciweavers

734 search results - page 104 / 147
» Computer Virus Propagation Models
Sort
View
EUROGRAPHICS
2010
Eurographics
15 years 6 months ago
Rendering Wave Effects with Augmented Light Field
Ray–based representations can model complex light transport but are limited in modeling diffraction effects that require the simulation of wavefront propagation. This paper prov...
Se Baek Oh, Sriram Kashyap, Rohit Garg, Sharat Cha...
MSWIM
2004
ACM
15 years 3 months ago
Experimental evaluation of wireless simulation assumptions
All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. Although it is tempting to assume that a...
David Kotz, Calvin C. Newport, Robert S. Gray, Jas...
ACMSE
2008
ACM
14 years 11 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
ICCV
2009
IEEE
16 years 2 months ago
Which Faces to Tag: Adding Prior Constraints into Active Learning
We introduce an algorithm that guides the user to tag faces in the best possible order during a face recognition assisted tagging scenario. In particular, we extend the active l...
Ashish Kapoor, Gang Hua, Amir Akbarzadeh and Simon...
EUROGRAPHICS
2010
Eurographics
14 years 11 months ago
User Controllable Color Transfer
This paper presents an image editing framework where users use reference images to indicate desired color edits. In our approach, users specify pairs of strokes to indicate corres...
Xiaobo An and Fabio Pellacini