Sciweavers

5693 search results - page 970 / 1139
» Socially relevant computing
Sort
View
CGF
2004
122views more  CGF 2004»
15 years 4 months ago
Exchanging Faces in Images
Pasting somebody's face into an existing image with traditional photo retouching and digital image processing tools has only been possible if both images show the face from t...
Volker Blanz, Kristina Scherbaum, Thomas Vetter, H...
COGSCI
2004
92views more  COGSCI 2004»
15 years 4 months ago
Varieties of crossing dependencies: structure dependence and mild context sensitivity
Four different kinds of grammars that can define crossing dependencies in human language are compared here: (i) context sensitive rewrite grammars with rules that depend on contex...
Edward P. Stabler Jr.
CN
2002
161views more  CN 2002»
15 years 4 months ago
Building multicast services from unicast forwarding and ephemeral state
We present an approach to building multicast services at the network layer using unicast forwarding and two additional building blocks: (i) ephemeral state probes, i.e. extremely l...
Su Wen, Jim Griffioen, Kenneth L. Calvert
FGCS
2000
81views more  FGCS 2000»
15 years 4 months ago
Managing the operator ordering problem in parallel databases
This paper focuses on parallel query optimization. We consider the operator problem and introduce a new class of execution strategies called Linear-Oriented Bushy Trees (LBTs). Co...
Harald Kosch
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 4 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz