Sciweavers

20745 search results - page 129 / 4149
» Computer graphics for all
Sort
View
NDSS
1998
IEEE
15 years 6 months ago
Attack Detection Methods for All-Optical Networks
This paper focuses on theoretical methods for detecting intentional attacks upon the infrastructure of an all-optical network. Applications of existing methods used in traditional...
Muriel Médard, Douglas Marquis, Stephen R. ...
COLING
2010
14 years 8 months ago
Verbs are where all the action lies: Experiences of Shallow Parsing of a Morphologically Rich Language
Verb suffixes and verb complexes of morphologically rich languages carry a lot of information. We show that this information if harnessed for the task of shallow parsing can lead ...
Harshada Gune, Mugdha Bapat, Mitesh M. Khapra, Pus...
ICDCS
2011
IEEE
14 years 1 months ago
The Routing Continuum from Shortest-Path to All-Path: A Unifying Theory
—Routing is a critical operation in networks. In the context of data and sensor networks, routing strategies such as shortest-path, multi-path and potential-based (“all-path”...
Yanhua Li, Zhi-Li Zhang, Daniel Boley
COMPUTING
2007
424views more  COMPUTING 2007»
15 years 1 months ago
Anamorphic 3D geometry
An anamorphic image appears distorted from all but a few viewpoints. They have been studied by artists and architects since the early fifteenth century. Computer graphics opens t...
Dianne Hansford, D. Collins
BIRTHDAY
2009
Springer
15 years 8 months ago
Hybrid BDD and All-SAT Method for Model Checking
We present a new hybrid BDD and SAT-based algorithm for model checking. Our algorithm is based on backward search, where each pre-image computation consists of an efficient All-SA...
Avi Yadgar, Orna Grumberg, Assaf Schuster