Sciweavers

298 search results - page 54 / 60
» Computer security: quality rather than quantity
Sort
View
64
Voted
SIGGRAPH
1998
ACM
15 years 1 months ago
Painterly Rendering with Curved Brush Strokes of Multiple Sizes
We present a new method for creating an image with a handpainted appearance from a photograph, and a new approach to designing styles of illustration. We “paint” an image with...
Aaron Hertzmann
BMCBI
2004
208views more  BMCBI 2004»
14 years 9 months ago
Using 3D Hidden Markov Models that explicitly represent spatial coordinates to model and compare protein structures
Background: Hidden Markov Models (HMMs) have proven very useful in computational biology for such applications as sequence pattern matching, gene-finding, and structure prediction...
Vadim Alexandrov, Mark Gerstein
CVPR
2005
IEEE
15 years 11 months ago
Bi-Layer Segmentation of Binocular Stereo Video
This paper describes two algorithms capable of real-time segmentation of foreground from background layers in stereo video sequences. Automatic separation of layers from colour/co...
Vladimir Kolmogorov, Antonio Criminisi, Andrew Bla...
95
Voted
GI
1997
Springer
15 years 1 months ago
Persistent Object Systems: From Technology to Market
Abstract. This text describes how persistent object system technology developed in European basic research is being used by a small German startup software company to realize innov...
Andreas Gawecki, Florian Matthes, Joachim W. Schmi...
81
Voted
GECCO
2008
Springer
114views Optimization» more  GECCO 2008»
14 years 10 months ago
Strategic positioning in tactical scenario planning
Capability planning problems are pervasive throughout many areas of human interest with prominent examples found in defense and security. Planning provides a unique context for op...
James M. Whitacre, Hussein A. Abbass, Ruhul A. Sar...