نتایج جستجو برای: parameter

تعداد نتایج: 214899  

2000
Sumedha Kshirsagar Stephane Garchery Nadia Magnenat-Thalmann

Robustness and speed are primary considerations when developing deformation methodologies for animatable mesh objects. The goal of this paper is to present such a robust and fast geometric mesh deformation algorithm. The algorithm is feature points based i.e. it can be applied to enable the animation of various mesh objects defined by the placement of their feature points. As a specific applica...

Journal: :Computers & Education 2009
Christos N. Moridis Anastasios A. Economides

Please cite this article in press as: Moridis, C. N network-based method. Computers & Education Building computerized mechanisms that will accurately, immediately and continually recognize a learner’s affective state and activate an appropriate response based on integrated pedagogical models is becoming one of the main aims of artificial intelligence in education. The goal of this paper is to d...

2001
Selim Temizer Leslie Pack Kaelbling

There are many methods that address navigation and path planning for mobile robots with non-holonomic motion constraints using clever techniques and exploiting application-specific data, but it is always better not to have any such constraints at all. In this document we re-examine the capabilities of some popular driving mechanisms from a different perspective and describe a method to obtain h...

2005
Hussain Al-Asaad Ganesh Valliappan Lourdes Ramirez

Functional verification plays a key role in the design verification cycle and the physical fault testing process. There are several functional verification methods that generate tests for modules independent of their implementation ; however, these methods do not scale well for medium to large circuits. In this paper we introduce a new implementation independent functional test generation techn...

2011
Michael Schläpfer Rolf Haenni Reto E. Koenig Oliver Spycher

Some years ago, Juels et al. introduced the first coercion-resistant Internet voting protocol. Its basic concept is still the most viable approach to address voter coercion and vote selling in Internet voting. However, one of the main open issues is its unrealistic computational requirements of the quadratic-time tallying procedure. In this paper, we examine the cause of this issue, namely the ...

2005
Graziano Tisato Piero Cosi Carlo Drioli Fabio Tesser

In order to speed-up the procedure for building an emotive/expressive talking head such as LUCIA, an integrated software called INTERFACE was designed and implemented in Matlab©. INTERFACE simplifies and automates many of the operations needed for that purpose. A set of processing tools, focusing mainly on dynamic articulatory data physically extracted by an automatic optotracking 3D movement a...

Journal: :Anais da Academia Brasileira de Ciencias 2014
Mikhail D Mikhailov Atila P Silva Freire

The present work studies, in detail, the unsteady wall-layer model of Walker et al. (1989, AIAA J., 27, 140 – 149) for the velocity profile in turbulent flows. Two new terms are included in the transcendental nonlinear system of equations that is used to determine the three main model parameters. The mathematical and physical feasible domains of the model are determined as a function of the non...

2017
Joachim Biskup Marcel Preuß

We treat a challenging problem of confidentiality-preserving data publishing: how to repeatedly update a released weakened view under a modification of the input parameter values, while continuously enforcing the confidentiality policy, i.e., without revealing a prohibited piece of information, neither for the updated view nor retrospectively for the previous versions of the view. In our semant...

2017
Christian Webb

We study the linear statistics of the circular β-ensemble with a Stein’s method argument, where the exchangeable pair is generated through circular Dyson Brownian motion. This generalizes previous results obtained in such a way for the CUE and provides a novel approach for studying linear statistics of β-ensembles. This approach allows studying simultaneously a collection of linear statistics w...

Journal: :IACR Cryptology ePrint Archive 2015
Yupu Hu Huiwen Jia

As a modified version of GGH map, Gu map-1 was successful in constructing multi-party key exchange (MPKE). In this short paper we present a result about the parameter setting of Gu map-1, therefore we can reduce a key parameter τ from original O(n) down to O(λn) (in theoretically secure case, where λ is the security parameter), and even down to O(2n) (in computationally secure case). Such optim...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید