Sciweavers

3544 search results - page 691 / 709
» Information Security in Open Systems
Sort
View
IV
2003
IEEE
200views Visualization» more  IV 2003»
15 years 3 months ago
Artist As Researcher, Understanding The Tools
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
Theresa Gartland-Jones
3DPVT
2002
IEEE
193views Visualization» more  3DPVT 2002»
15 years 3 months ago
Modeling shapes and textures from images: new frontiers
Increasingly, models of the world are directly built from images. The paper discusses a number of recent developments that try to push the enveloppe of what image-based modeling c...
Luc J. Van Gool, D. Vandemeulen, Gregor A. Kalbere...
107
Voted
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 3 months ago
Persona: A Contextualized and Personalized Web Search
Abstract— Recent advances in graph-based search techniques derived from Kleinberg’s work [1] have been impressive. This paper further improves the graph-based search algorithm ...
Francisco Tanudjaja, Lik Mu
AOSD
2007
ACM
15 years 2 months ago
Using natural language program analysis to locate and understand action-oriented concerns
Most current software systems contain undocumented high-level ideas implemented across multiple files and modules. When developers perform program maintenance tasks, they often wa...
David Shepherd, Zachary P. Fry, Emily Hill, Lori L...
ATAL
2006
Springer
15 years 2 months ago
Learning to commit in repeated games
Learning to converge to an efficient, i.e., Pareto-optimal Nash equilibrium of the repeated game is an open problem in multiagent learning. Our goal is to facilitate the learning ...
Stéphane Airiau, Sandip Sen