Sciweavers

1401 search results - page 239 / 281
» Flow and Changes in Appearance
Sort
View
67
Voted
STACS
1992
Springer
15 years 1 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
SIGGRAPH
2000
ACM
15 years 1 months ago
Acquiring the reflectance field of a human face
We present a method to acquire the reflectance field of a human face and use these measurements to render the face under arbitrary changes in lighting and viewpoint. We first acqu...
Paul E. Debevec, Tim Hawkins, Chris Tchou, Haarm-P...
SIGCOMM
1991
ACM
15 years 1 months ago
IP-Based Protocols for Mobile Internetworking
We consider the problem of providing network access to hosts whose physical location changes with time. Such hosts cannot depend on traditional forms of network connectivity and r...
John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.
66
Voted
DAGSTUHL
2007
14 years 11 months ago
Forgetting and Update -- an exploration
Knowledge Update (respectively Erasure) and Forgetting are two very different concepts, with very different underlying motivation. Both are tools for knowledge management; however ...
Abhaya C. Nayak, Yin Chen, Fangzhen Lin
EMNLP
2008
14 years 11 months ago
Relative Rank Statistics for Dialog Analysis
We introduce the relative rank differential statistic which is a non-parametric approach to document and dialog analysis based on word frequency rank-statistics. We also present a...
Juan Huerta