Sciweavers

5544 search results - page 916 / 1109
» Three Inadequate Models
Sort
View
126
Voted
JCP
2007
127views more  JCP 2007»
15 years 3 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
129
Voted
TOG
2008
145views more  TOG 2008»
15 years 3 months ago
Feedback control of cumuliform cloud formation based on computational fluid dynamics
Clouds play an important role for creating realistic images of outdoor scenes. In order to generate realistic clouds, many methods have been developed for modeling and animating c...
Yoshinori Dobashi, Katsutoshi Kusumoto, Tomoyuki N...
131
Voted
TOG
2008
235views more  TOG 2008»
15 years 3 months ago
Articulated mesh animation from multi-view silhouettes
Details in mesh animations are difficult to generate but they have great impact on visual quality. In this work, we demonstrate a practical software system for capturing such deta...
Daniel Vlasic, Ilya Baran, Wojciech Matusik, Jovan...
123
Voted
CAGD
2005
112views more  CAGD 2005»
15 years 3 months ago
Estimating differential quantities using polynomial fitting of osculating jets
This paper addresses the point-wise estimation of differential properties of a smooth manifold S--a curve in the plane or a surface in 3D--assuming a point cloud sampled over S is...
Frédéric Cazals, Marc Pouget
131
Voted
TOG
2008
139views more  TOG 2008»
15 years 3 months ago
Logarithmic perspective shadow maps
We present a novel shadow map parameterization to reduce perspective aliasing artifacts for both point and directional light sources. We derive the aliasing error equations for bo...
Brandon Lloyd, Naga K. Govindaraju, Cory Quammen, ...