—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Following up on a recently renewed interest in computational methods for M/G/1-type processes, this paper considers an M/G/1-like system in which the service time distribution is ...
Structured light is one of the well-known methods in part dimensional inspection that have been successfully employed in various applications in the past decades. In this method, ...
Weihua Sheng, Ning Xi, Mumin Song, Yifan Chen, Jam...
Using motion capture systems to animate humanlike figures still remains difficult when the movements are complex or need to be adapted to geometric constraints. We propose a new m...
We proposean approachfor modeling surfacedetails such as scales, feathers, or thorns. These types of cellular textures require a representation with more detail than texture-mappi...
Kurt W. Fleischer, David H. Laidlaw, Bena L. Curri...