Abstract. It is well-known that Abstract State Machines (ASMs) can simulate “stepby-step” any type of machines (Turing machines, RAMs, etc.). We aim to overcome two facts: 1) s...
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
This paper describes a method for animating the appearance of clothing, such as pants or a shirt, that fits closely to a figure’s body. Compared to flowing cloth, such as loo...
Huamin Wang, Florian Hecht, Ravi Ramamoorthi, Jame...
Abstract. Hand dyeing generates artistic representations with unique and complex patterns. The aesthetics of dyed patterns on a cloth originate from the physical properties of dyei...
We analyze a problem, which is relevant for physiological modeling of vascular networks: the initialization and optimization of specific, individual models of a functioning vessel ...