Sciweavers

15073 search results - page 2635 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
CGF
2006
263views more  CGF 2006»
15 years 4 months ago
A Predictive Light Transport Model for the Human Iris
Recently, light interactions with organic matter have become the object of detailed investigations by image synthesis researchers. Besides allowing these materials to be rendered ...
Michael W. Y. Lam, Gladimir V. G. Baranoski
CGF
2006
191views more  CGF 2006»
15 years 4 months ago
A Robust Two-Step Procedure for Quad-Dominant Remeshing
We propose a new technique for quad-dominant remeshing which separates the local regularity requirements from the global alignment requirements by working in two steps. In the fir...
Martin Marinov, Leif Kobbelt
CORR
2007
Springer
95views Education» more  CORR 2007»
15 years 4 months ago
Scheduling in Data Intensive and Network Aware (DIANA) Grid Environments
In Grids scheduling decisions are often made on the basis of jobs being either data or computation intensive: in data intensive situations jobs may be pushed to the data and in co...
Richard McClatchey, Ashiq Anjum, Heinz Stockinger,...
IJISEC
2007
61views more  IJISEC 2007»
15 years 4 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
SAC
2008
ACM
15 years 4 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
« Prev « First page 2635 / 3015 Last » Next »