Sciweavers

3830 search results - page 384 / 766
» From Reference Model to Component Model
Sort
View
VMV
2004
140views Visualization» more  VMV 2004»
15 years 6 months ago
Photo-Realistic Rendering of Blond Hair
We present a method for photo-realistic hair rendering, which is based on light scattering from (human) hair fibers. In contrast to existing approaches our method gives realistic ...
Arno Zinke, Gerrit Sobottka, Andreas Weber 0004
IJCV
2007
117views more  IJCV 2007»
15 years 4 months ago
Implicit Meshes for Effective Silhouette Handling
Abstract. Using silhouettes in uncontrolled environments typically requires handling occlusions as well as changing or cluttered backgrounds, which limits the applicability of most...
Slobodan Ilic, Mathieu Salzmann, Pascal Fua
SAFECOMP
2005
Springer
15 years 10 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
ICS
2010
Tsinghua U.
16 years 2 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
BMCBI
2006
129views more  BMCBI 2006»
15 years 4 months ago
Functional clustering of yeast proteins from the protein-protein interaction network
Background: The abundant data available for protein interaction networks have not yet been fully understood. New types of analyses are needed to reveal organizational principles o...
Taner Z. Sen, Andrzej Kloczkowski, Robert L. Jerni...