Sciweavers

10304 search results - page 1855 / 2061
» Computer science with the sciences: an emphasis in computati...
Sort
View
124
Voted
COCO
2009
Springer
126views Algorithms» more  COCO 2009»
15 years 8 months ago
New Results in the Simultaneous Message Passing Model via Information Theoretic Techniques
—Consider the following Simultaneous Message Passing (SMP) model for computing a relation f ⊆ X ×Y ×Z. In this model Alice, on input x ∈ X and Bob, on input y ∈ Y, send o...
Rahul Jain, Hartmut Klauck

Tutorial
2031views
16 years 8 months ago
Gradient Domain Manipulation Techniques in Vision and Graphics
The last decade has seen a tremendous interest in gradient domain manipulation techniques for applications in vision and graphics including retinex, high dynamic range (HDR) tone m...
Amit Agrawal and Ramesh Raskar
105
Voted
VIS
2004
IEEE
124views Visualization» more  VIS 2004»
16 years 3 months ago
Constrained Inverse Volume Rendering for Planetary Nebulae
Determining the three-dimensional structure of distant astronomical objects is a challenging task, given that terrestrial observations provide only one viewpoint. For this task, b...
Charles D. Hansen, Gordon L. Kindlmann, Marcus A. ...
126
Voted
DAC
2007
ACM
16 years 2 months ago
Synthesizing Stochasticity in Biochemical Systems
Randomness is inherent to biochemistry: at each instant, the sequence of reactions that fires is a matter of chance. Some biological systems exploit such randomness, choosing betw...
Brian Fett, Jehoshua Bruck, Marc D. Riedel
WWW
2008
ACM
16 years 2 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
« Prev « First page 1855 / 2061 Last » Next »