Sciweavers

19130 search results - page 3791 / 3826
» Modelling multi-path problems
Sort
View
IJIIDS
2008
201views more  IJIIDS 2008»
14 years 9 months ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...
CGF
2007
99views more  CGF 2007»
14 years 9 months ago
Layered Performance Animation with Correlation Maps
Performance has a spontaneity and “aliveness” that can be difficult to capture in more methodical animation processes such as keyframing. Access to performance animation has ...
Michael Neff, Irene Albrecht, Hans-Peter Seidel
CGF
2007
101views more  CGF 2007»
14 years 9 months ago
Consistent Viewing and Interaction for Multiple Users in Projection-Based VR Systems
In projection-based Virtual Reality (VR) systems, typically only one headtracked user views stereo images rendered from the correct view position. For other users, who are present...
Gerwin de Haan, Rene Molenaar, Michal Koutek, Frit...
COMBINATORICA
2007
129views more  COMBINATORICA 2007»
14 years 9 months ago
Birth control for giants
The standard Erd˝os-Renyi model of random graphs begins with n isolated vertices, and at each round a random edge is added. Parametrizing n 2 rounds as one time unit, a phase tra...
Joel H. Spencer, Nicholas C. Wormald
ISF
2008
114views more  ISF 2008»
14 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
« Prev « First page 3791 / 3826 Last » Next »