Sciweavers

2500 search results - page 249 / 500
» Specifying Behavior in C
Sort
View
CGF
1998
213views more  CGF 1998»
15 years 4 months ago
Interactive Construction and Animation of Layered Elastically Deformable Characters
An interactive system is described for creating and animating deformable 3D characters. By using a hybrid layered model of kinematic and physics-based components together with an ...
Russell Turner, Enrico Gobbetti
TKDE
2011
133views more  TKDE 2011»
14 years 11 months ago
Collaborative Filtering with Personalized Skylines
— Collaborative filtering (CF) systems exploit previous ratings and similarity in user behavior to recommend the top-k objects/records which are potentially most interesting to t...
Ilaria Bartolini, Zhenjie Zhang, Dimitris Papadias
TSE
2011
134views more  TSE 2011»
14 years 11 months ago
Verifying the Evolution of Probability Distributions Governed by a DTMC
— We propose a new probabilistic temporal logic iLTL which captures properties of systems whose state can be represented by probability mass functions (pmf’s). Using iLTL, we c...
YoungMin Kwon, Gul A. Agha
JAIR
2010
181views more  JAIR 2010»
14 years 11 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
JOC
2010
123views more  JOC 2010»
14 years 11 months ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell