Sciweavers

3108 search results - page 168 / 622
» The Elements of Computer Credibility
Sort
View
WG
1999
Springer
15 years 9 months ago
Finding Smallest Supertrees Under Minor Containment
The diversity of application areas relying on tree-structured data results in wide interest in algorithms which determine differences or similarities among trees. One way of meas...
Naomi Nishimura, Prabhakar Ragde, Dimitrios M. Thi...
141
Voted
RT
1997
Springer
15 years 9 months ago
Image-based Rendering with Controllable Illumination
: A new image-based rendering method, based on the light field and Lumigraph system, allows illumination to be changed interactively. It does not try to recover or use any geometr...
Tien-Tsin Wong, Pheng-Ann Heng, Siu-Hang Or, Wai-Y...
EDOC
2009
IEEE
15 years 9 months ago
Aligning Business Process Models
This paper studies the following problem: given a pair of business process models, determine which elements in one model are related to which elements in the other model. This prob...
Remco M. Dijkman, Marlon Dumas, Luciano Garc&iacut...
AINA
2006
IEEE
15 years 8 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
SCA
2007
15 years 7 months ago
Arbitrary cutting of deformable tetrahedralized objects
We propose a flexible geometric algorithm for placing arbitrary cracks and incisions on tetrahedralized deformable objects. Although techniques based on remeshing can also accomm...
Eftychios Sifakis, Kevin G. Der, Ronald Fedkiw