Sciweavers

223 search results - page 37 / 45
» pc 2006
Sort
View
91
Voted
FSE
2006
Springer
117views Cryptology» more  FSE 2006»
15 years 1 months ago
How Far Can We Go on the x64 Processors?
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
Mitsuru Matsui
86
Voted
AIIDE
2006
14 years 11 months ago
Normative Echoes: Use and Manipulation of Player Generated Content by Communities of NPCs
Normative Echoes is an interactive installation that explores ways to combine player-created content with procedural content. Animated autonomous agents inhabit virtual islands on...
Eric Baumer, Bill Tomlinson, Man Lok Yau, Thomas A...
108
Voted
CG
2006
Springer
14 years 10 months ago
Shape reasoning and understanding
s: clustering, denoising, sharp feature, shape abstraction, reverse engineering In this paper we describe a hierarchical face clustering algorithm for triangle meshes based on fit...
Bianca Falcidieno, Remco C. Veltkamp
93
Voted
ISM
2006
IEEE
173views Multimedia» more  ISM 2006»
14 years 10 months ago
Automatic Capture of Significant Points in a Computer Based Presentation
We describe an automatic classroom capture system that detects and records significant (stable) points in lectures by sampling and analyzing a sequence of screen capture frames fr...
Paul E. Dickson, W. Richards Adrion, Allen R. Hans...
81
Voted
ML
2006
ACM
142views Machine Learning» more  ML 2006»
14 years 10 months ago
The max-min hill-climbing Bayesian network structure learning algorithm
We present a new algorithm for Bayesian network structure learning, called Max-Min Hill-Climbing (MMHC). The algorithm combines ideas from local learning, constraint-based, and sea...
Ioannis Tsamardinos, Laura E. Brown, Constantin F....