Results 1  10
of
1,103,991
Multiresolution Analysis of Arbitrary Meshes
, 1995
"... In computer graphics and geometric modeling, shapes are often represented by triangular meshes. With the advent of laser scanning systems, meshes of extreme complexity are rapidly becoming commonplace. Such meshes are notoriously expensive to store, transmit, render, and are awkward to edit. Multire ..."
Abstract

Cited by 605 (16 self)
 Add to MetaCart
in practice typically do not meet this requirement. In this paper we present a method for overcoming the subdivision connectivity restriction, meaning that completely arbitrary meshes can now be converted to multiresolution form. The method is based on the approximation of an arbitrary initial mesh M by a
Families of trees decompose the random graph in an arbitrary way
 Combinatorics, Probability and Computing 13
, 2004
"... Let F = {H1,..., Hk} be a family of graphs. A graph G with m edges is called totally Fdecomposable if for every linear combination of the form α1e(H1)+···+αke(Hk) = m where each αi is a nonnegative integer, there is a coloring of the edges of G with α1 + · · · + αk colors such that exactly αi co ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
Let F = {H1,..., Hk} be a family of graphs. A graph G with m edges is called totally Fdecomposable if for every linear combination of the form α1e(H1)+···+αke(Hk) = m where each αi is a nonnegative integer, there is a coloring of the edges of G with α1 + · · · + αk colors such that exactly αi color classes induce each a copy of Hi, for i = 1,..., k. We prove that if F is any fixed family of trees then log n/n is a sharp threshold function for the property that the random graph G(n, p) is totally Fdecomposable. In particular, if H is a tree, then log n/n is a sharp threshold function for the property that G(n, p) contains ⌊e(G)/e(H) ⌋ edgedisjoint copies of H. 1
PseudoRandom Generation from OneWay Functions
 PROC. 20TH STOC
, 1988
"... Pseudorandom generators are fundamental to many theoretical and applied aspects of computing. We show howto construct a pseudorandom generator from any oneway function. Since it is easy to construct a oneway function from a pseudorandom generator, this result shows that there is a pseudorandom gene ..."
Abstract

Cited by 887 (22 self)
 Add to MetaCart
Pseudorandom generators are fundamental to many theoretical and applied aspects of computing. We show howto construct a pseudorandom generator from any oneway function. Since it is easy to construct a oneway function from a pseudorandom generator, this result shows that there is a pseudorandom
Multiresolution Analysis for Surfaces Of Arbitrary . . .
, 1993
"... Multiresolution analysis provides a useful and efficient tool for representing shape and analyzing features at multiple levels of detail. Although the technique has met with considerable success when applied to univariate functions, images, and more generally to functions defined on lR , to our k ..."
Abstract

Cited by 390 (3 self)
 Add to MetaCart
knowledge it has not been extended to functions defined on surfaces of arbitrary genus. In this
Spacetime block codes from orthogonal designs
 IEEE Trans. Inform. Theory
, 1999
"... Abstract — We introduce space–time block coding, a new paradigm for communication over Rayleigh fading channels using multiple transmit antennas. Data is encoded using a space–time block code and the encoded data is split into � streams which are simultaneously transmitted using � transmit antennas. ..."
Abstract

Cited by 1509 (42 self)
 Add to MetaCart
. The received signal at each receive antenna is a linear superposition of the � transmitted signals perturbed by noise. Maximumlikelihood decoding is achieved in a simple way through decoupling of the signals transmitted from different antennas rather than joint detection. This uses the orthogonal structure
Universally composable security: A new paradigm for cryptographic protocols
, 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract

Cited by 842 (43 self)
 Add to MetaCart
We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols
Dynamic Bayesian Networks: Representation, Inference and Learning
, 2002
"... Modelling sequential data is important in many areas of science and engineering. Hidden Markov models (HMMs) and Kalman filter models (KFMs) are popular for this because they are simple and flexible. For example, HMMs have been used for speech recognition and biosequence analysis, and KFMs have bee ..."
Abstract

Cited by 758 (3 self)
 Add to MetaCart
random variable. DBNs generalize KFMs by allowing arbitrary probability distributions, not just (unimodal) linearGaussian. In this thesis, I will discuss how to represent many different kinds of models as DBNs, how to perform exact and approximate inference in DBNs, and how to learn DBN models from
The Structure of Foreign Trade
, 1999
"... this paper what we know about foreign trade and in what ways our understanding has improved as a result of the last 20 years of research ..."
Abstract

Cited by 985 (16 self)
 Add to MetaCart
this paper what we know about foreign trade and in what ways our understanding has improved as a result of the last 20 years of research
The Design and Use of Steerable Filters
 IEEE Transactions on Pattern Analysis and Machine Intelligence
, 1991
"... Oriented filters are useful in many early vision and image processing tasks. One often needs to apply the same filter, rotated to different angles under adaptive control, or wishes to calculate the filter response at various orientations. We present an efficient architecture to synthesize filters of ..."
Abstract

Cited by 1079 (11 self)
 Add to MetaCart
of arbitrary orientations from linear combinations of basis filters, allowing one to adaptively "steer" a filter to any orientation, and to determine analytically the filter output as a function of orientation.
Attention and the detection of signals
 Journal of Experimental Psychology: General
, 1980
"... Detection of a visual signal requires information to reach a system capable of eliciting arbitrary responses required by the experimenter. Detection latencies are reduced when subjects receive a cue that indicates where in the visual field the signal will occur. This shift in efficiency appears to b ..."
Abstract

Cited by 532 (2 self)
 Add to MetaCart
Detection of a visual signal requires information to reach a system capable of eliciting arbitrary responses required by the experimenter. Detection latencies are reduced when subjects receive a cue that indicates where in the visual field the signal will occur. This shift in efficiency appears
Results 1  10
of
1,103,991