Sciweavers

6770 search results - page 1027 / 1354
» How GPUs Work
Sort
View
TOG
2012
253views Communications» more  TOG 2012»
13 years 6 months ago
Exploring collections of 3D models using fuzzy correspondences
Large collections of 3D models from the same object class (e.g., chairs, cars, animals) are now commonly available via many public repositories, but exploring the range of shape v...
Vladimir G. Kim, Wilmot Li, Niloy J. Mitra, Stephe...
TOG
2012
212views Communications» more  TOG 2012»
13 years 6 months ago
Understanding and improving the realism of image composites
Compositing is one of the most commonly performed operations in computer graphics. A realistic composite requires adjusting the appearance of the foreground and background so that...
Su Xue, Aseem Agarwala, Julie Dorsey, Holly E. Rus...
CRYPTO
2012
Springer
219views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Tamper and Leakage Resilience in the Split-State Model
It is notoriously difficult to create hardware that is immune from side channel and tampering attacks. A lot of recent literature, therefore, has instead considered algorithmic de...
Feng-Hao Liu, Anna Lysyanskaya
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 6 months ago
eTrust: understanding trust evolution in an online world
Most existing research about online trust assumes static trust relations between users. As we are informed by social sciences, trust evolves as humans interact. Little work exists...
Jiliang Tang, Huan Liu, Huiji Gao, Atish Das Sarma...
SIGIR
2012
ACM
13 years 6 months ago
Building reputation and trust using federated search and opinion mining
The term online reputation addresses trust relationships amongst agents in dynamic open systems. These can appear as ratings, recommendations, referrals and feedback. Several repu...
Somayeh Khatiban
« Prev « First page 1027 / 1354 Last » Next »