Sciweavers

473 search results - page 65 / 95
» Computing excluded minors
Sort
View
VISSYM
2007
15 years 21 days ago
TrustNeighborhoods: Visualizing Trust in Distributed File Sharing Systems
We present TrustNeighborhoods, a security trust visualization for situational awareness on the Internet aimed at novice and intermediate users of a distributed file sharing system...
Niklas Elmqvist, Philippas Tsigas
NSDI
2007
15 years 19 days ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
ANCS
2008
ACM
15 years 9 days ago
Performing time-sensitive network experiments
Time-sensitive network experiments are difficult. There are major challenges involved in generating high volumes of sufficiently realistic traffic. Additionally, accurately measur...
Neda Beheshti, Yashar Ganjali, Monia Ghobadi, Nick...
VIP
2000
14 years 11 months ago
A Fuzzy Rule-Based Interactive Methodology for Training Multimedia Actors
Computer animation has come a long way during the last decade and is now capable of producing near-realistic rendered 3D computer graphics models of expressive, talking, acting hu...
Savant Karunaratne, Hong Yan
TOG
2008
109views more  TOG 2008»
14 years 10 months ago
Geometric skinning with approximate dual quaternion blending
Skinning of skeletally deformable models is extensively used for real-time animation of characters, creatures and similar objects. The standard solution, linear blend skinning, ha...
Ladislav Kavan, Steven Collins, Jirí Z&aacu...