Sciweavers

5580 search results - page 735 / 1116
» Randomized priority algorithms
Sort
View
EDUTAINMENT
2007
Springer
15 years 10 months ago
Interactive Composition of 3D Faces for Virtual Characters
As many 3D on-line games appear, there is an increased need for simple and efficient techniques to create many new faces. This paper presents a new algorithm to composite 3D faces ...
Haeyoung Lee, Sungyeol Lee
130
Voted
IBPRIA
2007
Springer
15 years 10 months ago
Bayesian Oil Spill Segmentation of SAR Images Via Graph Cuts
Abstract. This paper extends and generalizes the Bayesian semisupervised segmentation algorithm [1] for oil spill detection using SAR images. In the base algorithm on which we buil...
Sónia Pelizzari, José M. Bioucas-Dia...
122
Voted
WAW
2007
Springer
120views Algorithms» more  WAW 2007»
15 years 10 months ago
Manipulation-Resistant Reputations Using Hitting Time
Popular reputation systems for linked networks can be manipulated by spammers who strategically place links. The reputation of node v is interpreted as the world’s opinion of vâ...
John E. Hopcroft, Daniel Sheldon
ICMCS
2006
IEEE
134views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Motion Segmentation of 3D Video using Modified Shape Distribution
In this paper, temporal segmentation of 3D video based on motion analysis is presented. 3D video is a sequence of 3D models made for a real-world dynamic object. A modified shape ...
Toshihiko Yamasaki, Kiyoharu Aizawa
ICSM
2006
IEEE
15 years 10 months ago
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding
One approach to supporting program comprehension involves binding concepts to source code. Previously proposed approaches to concept binding have enforced nonoverlapping boundarie...
Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahda...