Sciweavers

3591 search results - page 636 / 719
» Typing linear constraints
Sort
View
GRAPHITE
2007
ACM
15 years 1 months ago
Compact and efficient generation of radiance transfer for dynamically articulated characters
We present a data-driven technique for generating the precomputed radiance transfer vectors of an animated character as a function of its joint angles. We learn a linear model for...
Derek Nowrouzezahrai, Patricio D. Simari, Evangelo...
ELPUB
2008
ACM
14 years 11 months ago
A review of journal policies for sharing research data
Background: Sharing data is a tenet of science, yet commonplace in only a few subdisciplines. Recognizing that a data sharing culture is unlikely to be achieved without policy gui...
Heather A. Piwowar, Wendy Webber Chapman
AGIS
2008
319views more  AGIS 2008»
14 years 10 months ago
An Efficient Algorithm for Raster-to-Vector Data Conversion
Data conversion from raster to vector (R2V) is a key function in Geographic Information Systems (GIS) and remote sensing (RS) image processing for integrating GIS and RS data. The...
Junhua Teng, Fahui Wang, Yu Liu
BMCBI
2008
115views more  BMCBI 2008»
14 years 10 months ago
Principal components analysis based methodology to identify differentially expressed genes in time-course microarray data
Background: Time-course microarray experiments are being increasingly used to characterize dynamic biological processes. In these experiments, the goal is to identify genes differ...
Sudhakar Jonnalagadda, Rajagopalan Srinivasan
COMCOM
2006
88views more  COMCOM 2006»
14 years 10 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia