Sciweavers

5326 search results - page 39 / 1066
» On what we can ensure
Sort
View
109
Voted
DIGRA
2005
Springer
15 years 6 months ago
A Short and Simple Definition of What a Videogame Is
Videogames have been studied seriously only for a few years. So, we can wonder how we could use the recent academic works to approach new design methods. This article proposes a f...
Nicolas Esposito
92
Voted
CVPR
2005
IEEE
16 years 2 months ago
Energy Minimization via Graph Cuts: Settling What is Possible
The recent explosion of interest in graph cut methods in computer vision naturally spawns the question: what energy functions can be minimized via graph cuts? This question was fi...
Daniel Freedman, Petros Drineas
SIGSOFT
2007
ACM
16 years 1 months ago
Fault and adversary tolerance as an emergent property of distributed systems' software architectures
Fault and adversary tolerance have become not only desirable but required properties of software systems because mission-critical systems are commonly distributed on large network...
Yuriy Brun, Nenad Medvidovic
75
Voted
RTA
2007
Springer
15 years 6 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
ECCV
2008
Springer
16 years 2 months ago
Priors for Large Photo Collections and What They Reveal about Cameras
A large photo collection downloaded from the internet spans a wide range of scenes, cameras, and photographers. In this paper we introduce several novel priors for statistics of su...
Sujit Kuthirummal, Aseem Agarwala, Dan B. Goldman,...