Sciweavers

5722 search results - page 390 / 1145
» Security Function Interactions
Sort
View
JETAI
2002
69views more  JETAI 2002»
15 years 3 months ago
The interaction of representations and planning objectives for decision-theoretic planning tasks
We study decision-theoretic planning or reinforcement learning in the presence of traps such as steep slopes for outdoor robots or staircases for indoor robots. In this case, achi...
Sven Koenig, Yaxin Liu
SG
2010
Springer
15 years 1 months ago
An Interactive Interface for Lighting-by-Example
Lighting design in computer graphics is essentially not a random process but one driven by both a technical and aesthetic appreciation of lighting. In some applications, the result...
Hai Nam Ha, Christophe Lino, Marc Christie, Patric...
CGF
2010
135views more  CGF 2010»
15 years 24 days ago
Interactive Rendering of Non-Constant, Refractive Media Using the Ray Equations of Gradient-Index Optics
Existing algorithms can efficiently render refractive objects of constant refractive index. For a medium with a continuously varying index of refraction, most algorithms use the r...
Chen Cao, Zhong Ren, Baining Guo, Kun Zhou
119
Voted
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
15 years 10 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco
146
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Efficient Commerce Protocols based on One-Time Pads
We present a new commerce protocol that allows customers and merchants to conduct face-to-face creditcard authorizations with a credit card company securely with the option of ano...
Michael A. Schneider, Edward W. Felten