Sciweavers

1265 search results - page 135 / 253
» Computer poker: A review
Sort
View
SIAMSC
2008
133views more  SIAMSC 2008»
14 years 10 months ago
Numerical Variational Methods Applied to Cylinder Buckling
We review and compare different computational variational methods applied to a system of fourth order equations that arises as a model of cylinder buckling. We describe both the di...
Jirí Horák, Gabriel J. Lord, Mark A....
CAD
2005
Springer
14 years 10 months ago
Deployment of an AEC industry sector product model
CIMsteel Integration Standard, Version 2 (CIS/2) is an industry-developed product model based on ISO-STEP technology that has been widely adopted within the steel construction ind...
Charles M. Eastman, F. Wang, S.-J. You, D. Yang
CG
2004
Springer
14 years 10 months ago
Recursive turtle programs and iterated affine transformations
We provide a formal proof of equivalence between the class of fractals created by Recursive Turtle Programs (RTP) and Iterated Affine Transformations (IAT). We begin by reviewing ...
Tao Ju, Scott Schaefer, Ron Goldman
ACL
2009
14 years 7 months ago
An Ontology-Based Approach for Key Phrase Extraction
Automatic key phrase extraction is fundamental to the success of many recent digital library applications and semantic information retrieval techniques and a difficult and essenti...
Chau Q. Nguyen, Tuoi T. Phan
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
14 years 7 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier