Sciweavers

19130 search results - page 3629 / 3826
» Modelling multi-path problems
Sort
View
SIGGRAPH
1995
ACM
15 years 6 months ago
Feature-based volume metamorphosis
Image metamorphosis, or image morphing, is a popular technique for creating a smooth transition between two images. For synthetic images, transforming and rendering the underlying...
Apostolos Lerios, Chase D. Garfinkle, Marc Levoy
140
Voted
LICS
1991
IEEE
15 years 6 months ago
Logic Programming in a Fragment of Intuitionistic Linear Logic
When logic programming is based on the proof theory of intuitionistic logic, it is natural to allow implications in goals and in the bodies of clauses. Attempting to prove a goal ...
Joshua S. Hodas, Dale Miller
120
Voted
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
131
Voted
AAAI
2008
15 years 5 months ago
POIROT - Integrated Learning of Web Service Procedures
POIROT is an integration framework for combining machine learning mechanisms to learn hierarchical models of web services procedures from a single or very small set of demonstrati...
Mark H. Burstein, Robert Laddaga, David McDonald, ...
116
Voted
USENIX
2007
15 years 5 months ago
MapJAX: Data Structure Abstractions for Asynchronous Web Applications
Data Structure Abstractions for Asynchronous Web Applications Daniel S. Myers MIT CSAIL Jennifer N. Carlisle MIT CSAIL James A. Cowling MIT CSAIL Barbara H. Liskov MIT CSAIL The c...
Daniel S. Myers, Jennifer N. Carlisle, James A. Co...
« Prev « First page 3629 / 3826 Last » Next »