Results 1  10
of
989
Visibility Preprocessing For Interactive Walkthroughs
 IN: COMPUTER GRAPHICS (SIGGRAPH 91 PROCEEDINGS
, 1991
"... The number of polygons comprising interesting architectural models is many more than can be rendered at interactive frame rates. However, due to occlusion by opaque surfaces (e.g., walls), only a small fraction of atypical model is visible from most viewpoints. We describe a method of visibility pre ..."
Abstract

Cited by 332 (16 self)
 Add to MetaCart
The number of polygons comprising interesting architectural models is many more than can be rendered at interactive frame rates. However, due to occlusion by opaque surfaces (e.g., walls), only a small fraction of atypical model is visible from most viewpoints. We describe a method of visibility
EEGLAB: an open source toolbox for analysis of singletrial EEG dynamics including independent component analysis
 J. Neurosci. Methods
"... Abstract: We have developed a toolbox and graphic user interface, EEGLAB, running under the crossplatform MATLAB environment (The Mathworks, Inc.) for processing collections of singletrial and/or averaged EEG data of any number of channels. Available functions include EEG data, channel and event i ..."
Abstract

Cited by 886 (45 self)
 Add to MetaCart
information importing, data visualization (scrolling, scalp map and dipole model plotting, plus multitrial ERPimage plots), preprocessing (including artifact rejection, filtering, epoch selection, and averaging), Independent Component Analysis (ICA) and time/frequency decompositions including channel
OPTICS: Ordering Points To Identify the Clustering Structure
, 1999
"... Cluster analysis is a primary method for database mining. It is either used as a standalone tool to get insight into the distribution of a data set, e.g. to focus further analysis and data processing, or as a preprocessing step for other algorithms operating on the detected clusters. Almost all of ..."
Abstract

Cited by 527 (51 self)
 Add to MetaCart
Cluster analysis is a primary method for database mining. It is either used as a standalone tool to get insight into the distribution of a data set, e.g. to focus further analysis and data processing, or as a preprocessing step for other algorithms operating on the detected clusters. Almost all
Modeling the Interaction of Light Between Diffuse Surfaces
, 1984
"... A method is described which models the interaction of light between diffusely reflecting surfaces. Current light reflection models used in computer graphics do not account for the objecttoobject reflection between diffuse surfaces, and thus incorrectly compute the global illumination effects. The ..."
Abstract

Cited by 400 (6 self)
 Add to MetaCart
A method is described which models the interaction of light between diffusely reflecting surfaces. Current light reflection models used in computer graphics do not account for the objecttoobject reflection between diffuse surfaces, and thus incorrectly compute the global illumination effects
Impossibility Results for LeakageResilient Zero Knowledge and MultiParty Computation
"... In [AGP14] Ananth et al. showed that continual leakageresilient nontransferable interactive proofs exist when a leakfree inputencoding phase is allowed and a common reference string is available. They left open the problem of removing the need of a common reference string. In [BGJK12] Boyle et a ..."
Abstract
 Add to MetaCart
al. showed that for some interesting functionalities continual leakageresilient secure computation is possible when leakfree interactive preprocessing and inputencoding phases are allowed. They left open the problem of removing the interactive preprocessing. In this work we study the above
Interactive Control of Avatars Animated with Human Motion Data
, 2002
"... Realtime control of threedimensional avatars is an important problem in the context of computer games and virtual environments. Avatar animation and control is difficult, however, because a large repertoire of avatar behaviors must be made available, and the user must be able to select from this s ..."
Abstract

Cited by 369 (38 self)
 Add to MetaCart
this set of behaviors, possibly with a lowdimensional input device. One appealing approach to obtaining a rich set of avatar behaviors is to collect an extended, unlabeled sequence of motion data appropriate to the application. In this paper, we show that such a motion database can be preprocessed
NonInteractive Verifiable Computing: Outsourcing Computation to Untrusted Workers
, 2009
"... Verifiable Computation enables a computationally weak client to “outsource ” the computation of a function F on various inputs x1,...,xk to one or more workers. The workers return the result of the function evaluation, e.g., yi = F(xi), as well as a proof that the computation of F was carried out co ..."
Abstract

Cited by 221 (13 self)
 Add to MetaCart
correctly on the given value xi. The verification of the proof should require substantially less computational effort than computing F(xi) from scratch. We present a protocol that allows the worker to return a computationallysound, noninteractive proof that can be verified in O(m) time, where m is the bit
Approximating Polyhedra with Spheres for TimeCritical Collision Detection
 ACM Transactions on Graphics
, 1996
"... This paper presents a method for approximating polyhedral objects to support a timecritical collisiondetection algorithm. The approximations are hierarchies of spheres, and they allow the timecritical algorithm to progressively refine the accuracy of its detection, stopping as needed to maintain ..."
Abstract

Cited by 212 (1 self)
 Add to MetaCart
the realtime performance essential for interactive applications. The key to this approach is a preprocess that automatically builds tightly fitting hierarchies for rigid and articulated objects. The preprocess uses medialaxis surfaces, which are skeletal representations of objects. These skeletons guide
Surface Modeling with Oriented Particle Systems
 COMPUTER GRAPHICS
, 1991
"... Splines and deformable surface models are widely used in computer graphics to describe freeform surfaces. These methods require manual preprocessing to discretize the surface into patches and to specify their connectivity. We present a new model of elastic surfaces based on interacting particle sys ..."
Abstract

Cited by 216 (6 self)
 Add to MetaCart
Splines and deformable surface models are widely used in computer graphics to describe freeform surfaces. These methods require manual preprocessing to discretize the surface into patches and to specify their connectivity. We present a new model of elastic surfaces based on interacting particle
A Review of Vessel Extraction Techniques and Algorithms
 ACM Computing Surveys
, 2000
"... Vessel segmentation algorithms are the critical components of circulatory blood vessel analysis systems. We present a survey of vessel extraction techniques and algorithms. We put the various vessel extraction approaches and techniques in perspective by means of a classification of the existing r ..."
Abstract

Cited by 185 (0 self)
 Add to MetaCart
divided into sub categories. We have also created tables to compare the papers in each category against such criteria as dimensionality, input type, preprocessing, user interaction, and result type.
Results 1  10
of
989