Sciweavers

5948 search results - page 928 / 1190
» Computing Robust Counter-Strategies
Sort
View
126
Voted
NOSSDAV
2004
Springer
15 years 9 months ago
A framework for architecting peer-to-peer receiver-driven overlays
This paper presents a simple and scalable framework for architecting peer-to-peer overlays called Peer-to-peer Receiverdriven Overlay (or PRO). PRO is designed for non-interactive...
Reza Rejaie, Shad Stafford
130
Voted
RT
2004
Springer
15 years 9 months ago
Realtime Caustics using Distributed Photon Mapping
With the advancements in realtime ray tracing and new global illumination algorithms we are now able to render the most important illumination effects at interactive rates. One of...
Johannes Günther, Ingo Wald, Philipp Slusalle...
143
Voted
SEMWEB
2004
Springer
15 years 9 months ago
Personalized Reputation Management in P2P Networks
P2P networks have become increasingly popular in the recent years. However, their open, distributed and anonymous nature makes them very vulnerable against malicious users who prov...
Paul-Alexandru Chirita, Wolfgang Nejdl, Mario T. S...
ECCV
2010
Springer
15 years 9 months ago
Geometric Image Parsing in Man-Made Environments
Abstract. We present a new parsing framework for the line-based geometric analysis of a single image coming from a man-made environment. This parsing framework models the scene as ...
ECCV
2010
Springer
15 years 9 months ago
Adaptive Regularization for Image Segmentation Using Local Image Curvature Cues
Abstract. Image segmentation techniques typically require proper weighting of competing data fidelity and regularization terms. Conventionally, the associated parameters are set t...