Sciweavers

2451 search results - page 240 / 491
» Effective View Navigation
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
PG
2002
IEEE
15 years 9 months ago
Lighting Interpolation by Shadow Morphing Using Intrinsic Lumigraphs
Densely-sampled image representations such as the light field or Lumigraph have been effective in enabling photorealistic image synthesis. Unfortunately, lighting interpolation w...
Yasuyuki Matsushita, Sing Bing Kang, Stephen Lin, ...
GECCO
2006
Springer
132views Optimization» more  GECCO 2006»
15 years 8 months ago
Combining genetic algorithms with squeaky-wheel optimization
The AI optimization algorithm called "Squeaky-Wheel Optimization" (SWO) has proven very effective in a variety of real-world applications. Although the ideas behind SWO ...
Justin Terada, Hoa Vo, David Joslin
CIKM
2008
Springer
15 years 6 months ago
Retrievability: an evaluation measure for higher order information access tasks
Evaluation in Information Retrieval (IR) has long focused on effectiveness and efficiency. However, new and emerging access tasks now demand alternative evaluation measures which ...
Leif Azzopardi, Vishwa Vinay
ICCV
2011
IEEE
14 years 4 months ago
Evaluation of Image Features Using a Photorealistic Virtual World
Image features are widely used in computer vision applications. They need to be robust to scene changes and image transformations. Designing and comparing feature descriptors requ...
Biliana Kaneva, Antonio Torralba, Bill Freeman