Sciweavers

1120 search results - page 161 / 224
» time 1999
Sort
View
100
Voted
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
15 years 5 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman
103
Voted
SIGGRAPH
1999
ACM
15 years 5 months ago
Voice Puppetry
We introduce a method for predicting a control signal from another related signal, and apply it to voice puppetry: Generating full facial animation from expressive information in ...
Matthew Brand
109
Voted
SIGGRAPH
1999
ACM
15 years 5 months ago
Deep Compression for Streaming Texture Intensive Animations
This paper presents a streaming technique for synthetic texture intensive 3D animation sequences. There is a short latency time while downloading the animation, until an initial f...
Daniel Cohen-Or, Yair Mann, Shachar Fleishman
98
Voted
HICSS
1999
IEEE
106views Biometrics» more  HICSS 1999»
15 years 5 months ago
Automating the Interoperation of Information Processing Tools
This paper describes an agent-based architecture designed to support the interoperation of distributed and disparate information processing tools and resources. This work is based...
Stephen Cranefield, Emanuela Moreale, Bryce McKinl...
115
Voted
SIGGRAPH
1999
ACM
15 years 5 months ago
Pattern-Based Texturing Revisited
We present a texturing method that correctly maps homogeneous non-periodic textures to arbitrary surfaces without any of the difficulties usually encountered using existing tools...
Fabrice Neyret, Marie-Paule Cani