Sciweavers

5948 search results - page 271 / 1190
» Computing Robust Counter-Strategies
Sort
View
150
Voted
ISWC
1997
IEEE
15 years 8 months ago
Towards Situated Computing
Situated computing concerns the ability of computing devices to detect, interpret and respond to aspects of the user’s local environment. In this paper, we use our recent protot...
Richard Hull 0002, Philip Neaves, James Bedford-Ro...
ICPR
2008
IEEE
15 years 10 months ago
Finite element modeling of facial deformation in videos for computing strain pattern
We present a finite element modeling based approach to compute strain patterns caused by facial deformation during expressions in videos. A sparse motion field computed through ...
Vasant Manohar, Matthew Shreve, Dmitry B. Goldgof,...
HPDC
2002
IEEE
15 years 9 months ago
Error Scope on a Computational Grid: Theory and Practice
Error propagation is a central problem in grid computing. We re-learned this while adding a Java feature to the Condor computational grid. Our initial experience with the system w...
Douglas Thain, Miron Livny
GC
2004
Springer
15 years 9 months ago
Towards a Formal Treatment of Secrecy Against Computational Adversaries
Polynomial time adversaries based on a computational view of cryptography have additional capabilities that the classical Dolev-Yao adversary model does not include. To relate thes...
Angelo Troina, Alessandro Aldini, Roberto Gorrieri
DAC
2000
ACM
16 years 5 months ago
To split or to conjoin: the question in image computation
Image computation is the key step in fixpoint computations that are extensively used in model checking. Two techniques have been used for this step: one based on conjunction of the...
In-Ho Moon, James H. Kukula, Kavita Ravi, Fabio So...