نتایج جستجو برای: tracing

تعداد نتایج: 28358  

1996
D. Ghazanfarpour

Ray-tracing is one of the most popular techniques for rendering 3D images. Effects such as shadows, reflection, refraction and so on can be produced with this technique. However, raytracing is a point-sampling technique with well-known aliasing problems. In particular, small objects and small shadows can be hidden between rays and not be detected. No ray-tracing method, even using oversampling,...

Journal: :IEICE Transactions 2017
Tetsuro Imai

With the advances in computer processing that have yielded an enormous increase in performance, numerical analytical approaches based on electromagnetic theory have recently been applied to mobile radio propagation analysis. One such approach is the ray-tracing method based on geometrical optics and the uniform geometrical theory of diffraction. In this paper, ray-tracing techniques that have b...

2005
Yanyun Chen Lin Xia Tien-Tsin Wong Xin Tong Hujun Bao Baining Guo Heung-Yeung Shum

Weathering modeling introduces blemishes such as dirt, rust, cracks and scratches to virtual scenery. In this paper we present a visual simulation technique that works well for a wide variety of weathering phenomena. Our technique, called γ-ton tracing, is based on a type of aging-inducing particles called γ-tons. Modeling a weathering effect with γ-ton tracing involves tracing a large number o...

2014
Katayoun Farrahi Rémi Emonet Manuel Cebrian

Traditional contact tracing relies on knowledge of the interpersonal network of physical interactions, where contagious outbreaks propagate. However, due to privacy constraints and noisy data assimilation, this network is generally difficult to reconstruct accurately. Communication traces obtained by mobile phones are known to be good proxies for the physical interaction network, and they may p...

2002
Aggelos Kiayias Moti Yung

An important open problem in the area of Traitor Tracing is designing a scheme with constant expansion of the size of keys (users’ keys and the encryption key) and of the size of ciphertexts with respect to the size of the plaintext. This problem is known from the introduction of Traitor Tracing by Chor, Fiat and Naor. We refer to such schemes as traitor tracing with constant transmission rate....

Journal: :Vision Research 2010
Christine Lefebvre Pierre Jolicœur Roberto Dell’Acqua

ERPs were recorded while participants performed a curve tracing task in which they had to identify the end point of a target curve presented among three other distractor curves. Differential activation associated with the side of the target curve was found in the form of a sustained posterior contralateral negativity (SPCN). This contralateral brain activity suggests covert attention was deploy...

2016
Christian Baun

Distributed systems, especially clusters, can be used to execute ray tracing tasks in parallel for speeding up the image computation. Because ray tracing is a computational expensive and memory consuming task, ray tracing can also be used to benchmark clusters. This paper introduces task-distributor, a free software solution for the parallel execution of ray tracing tasks in distributed systems...

2013
Markus Broecker Bruce H. Thomas Ross T. Smith

Copyright is held by the author/owner(s). ISMAR 2013, October 1 – 4, 2013, Adelaide, Australia. ACM 978-1-XXXX-XXXX-X/XX/XX. Abstract Ray tracing is an elegant and intuitive image generation method. The introduction of GPU-accelerated ray tracing and corresponding software frameworks makes this rendering technique a viable option for Augmented Reality applications. Spatial Augmented Reality emp...

1996
Birgit Pfitzmann

Traitor tracing schemes as introduced by Chor, Fiat, and Naor at Crypto ’94 are intended for tracing people who abuse a broadcast encryption scheme by allowing additional, illegitimate users to decrypt the data. The schemes should also provide legal evidence for such treachery. We discuss and improve the quality of such evidence, i.e., the security of trials that would be held about supposedly ...

2002
Heejin Jang Sangwook Kim

Since current internet intruders conceal their real identity by distributed or disguised attacks, it is not easy to deal with intruders properly only with an ex post facto chase. Therefore, it needs to trace the intruder in real time. Existing real-time intruder tracing systems has a spatial restriction. The security domain remains unchanged if there is no system security officer’s intervention...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید