Sciweavers

5948 search results - page 961 / 1190
» Computing Robust Counter-Strategies
Sort
View
HPDC
2008
IEEE
15 years 4 months ago
Eliminating the middleman: peer-to-peer dataflow
Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflo...
Adam Barker, Jon B. Weissman, Jano I. van Hemert
AAMAS
2008
Springer
15 years 4 months ago
A capabilities-based model for adaptive organizations
Multiagent systems have become popular over the last few years for building complex, adaptive systems in a distributed, heterogeneous setting. Multiagent systems tend to be more r...
Scott A. DeLoach, Walamitien H. Oyenan, Eric T. Ma...
BIOSYSTEMS
2007
87views more  BIOSYSTEMS 2007»
15 years 4 months ago
Robot control with biological cells
At present there exists a large gap in size, performance, adaptability and robustness between natural and artificial information processors for performing coherent perception-act...
Soichiro Tsuda, Klaus-Peter Zauner, Yukio-Pegio Gu...
CG
2010
Springer
15 years 4 months ago
Realistic cloth augmentation in single view video under occlusions
Augmenting cloth in real video is a challenging task because cloth performs complex motions and deformations and produces complex shading on the surface. Therefore, for a realisti...
Anna Hilsmann, David C. Schneider, Peter Eisert
CGF
2008
137views more  CGF 2008»
15 years 4 months ago
Exploiting Visibility Correlation in Direct Illumination
The visibility function in direct illumination describes the binary visibility over a light source, e.g., an environment map. Intuitively, the visibility is often strongly correla...
Petrik Clarberg, Tomas Akenine-Möller