Results 1  10
of
23,862
Rendering of Surfaces from Volume Data
 IEEE COMPUTER GRAPHICS AND APPLICATIONS
, 1988
"... The application of volume rendering techniques to the display of surfaces from sampled scalar functions of three spatial dimensions is explored. Fitting of geometric primitives to the sampled data is not required. Images are formed by directly shading each sample and projecting it onto the picture ..."
Abstract

Cited by 875 (12 self)
 Add to MetaCart
The application of volume rendering techniques to the display of surfaces from sampled scalar functions of three spatial dimensions is explored. Fitting of geometric primitives to the sampled data is not required. Images are formed by directly shading each sample and projecting it onto
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment
 In IEEE Infocom
, 2001
"... Energyaware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of wellknown wireless network interfaces and device specifications do not ..."
Abstract

Cited by 669 (3 self)
 Add to MetaCart
not provide information in a form that is helpful to protocol developers. This paper describes a series of experiments which obtained detailed measurements of the energy consumption of an IEEE 802.11 wireless network interface operating in an ad hoc networking environment. The data is presented as a
A New Statistical Parser Based on Bigram Lexical Dependencies
, 1996
"... This paper describes a new statistical parser which is based on probabilities of dependencies between headwords in the parse tree. Standard bigram probability estimation techniques are extended to calculate probabilities of dependencies between pairs of words. Tests using Wall Street Journal ..."
Abstract

Cited by 490 (4 self)
 Add to MetaCart
This paper describes a new statistical parser which is based on probabilities of dependencies between headwords in the parse tree. Standard bigram probability estimation techniques are extended to calculate probabilities of dependencies between pairs of words. Tests using Wall Street
Loopy belief propagation for approximate inference: An empirical study. In:
 Proceedings of Uncertainty in AI,
, 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" the use of Pearl's polytree algorithm in a Bayesian network with loops can perform well in the context of errorcorrecting codes. The most dramatic instance of this is the near Shannonlimit performanc ..."
Abstract

Cited by 676 (15 self)
 Add to MetaCart
. Introduction The task of calculating posterior marginals on nodes in an arbitrary Bayesian network is known to be NP hard In this paper we investigate the approximation performance of "loopy belief propagation". This refers to using the wellknown Pearl polytree algorithm [12] on a Bayesian network
Ngrambased text categorization
 In Proc. of SDAIR94, 3rd Annual Symposium on Document Analysis and Information Retrieval
, 1994
"... Text categorization is a fundamental task in document processing, allowing the automated handling of enormous streams of documents in electronic form. One difficulty in handling some classes of documents is the presence of different kinds of textual errors, such as spelling and grammatical errors in ..."
Abstract

Cited by 445 (0 self)
 Add to MetaCart
Text categorization is a fundamental task in document processing, allowing the automated handling of enormous streams of documents in electronic form. One difficulty in handling some classes of documents is the presence of different kinds of textual errors, such as spelling and grammatical errors
A rapid hierarchical radiosity algorithm
 Computer Graphics
, 1991
"... This paper presents a rapid hierarchical radiosity algorithm for illuminating scenes containing lar e polygonal patches. The afgorithm constructs a hierarchicâ€œJ representation of the form factor matrix by adaptively subdividing patches into su bpatches according to a usersupplied error bound. The a ..."
Abstract

Cited by 409 (11 self)
 Add to MetaCart
. The algorithm guarantees that all form factors are calculated to the same precision, removing many common image artifacts due to inaccurate form factors. More importantly, the al orithm decomposes the form factor matrix into at most O? n) blocks (where n is the number of elements). Previous radiosity
Toward Optimal Active Learning through Sampling Estimation of Error Reduction
 In Proc. 18th International Conf. on Machine Learning
, 2001
"... This paper presents an active learning method that directly optimizes expected future error. This is in contrast to many other popular techniques that instead aim to reduce version space size. These other methods are popular because for many learning models, closed form calculation of the expec ..."
Abstract

Cited by 353 (2 self)
 Add to MetaCart
This paper presents an active learning method that directly optimizes expected future error. This is in contrast to many other popular techniques that instead aim to reduce version space size. These other methods are popular because for many learning models, closed form calculation
Data structure for soft objects
 Visual Computer
, 1986
"... We:introduce the concept of soft objects whose shape changes in response to their surroundings. Established geometric modelling techniques exist to handle most engineering components, including 'free form ' shapes such as car bodies and telephones. More recently, there has been a lot of in ..."
Abstract

Cited by 315 (25 self)
 Add to MetaCart
We:introduce the concept of soft objects whose shape changes in response to their surroundings. Established geometric modelling techniques exist to handle most engineering components, including 'free form ' shapes such as car bodies and telephones. More recently, there has been a lot
Locating the Nodes  Cooperative localization in wireless sensor networks
, 2005
"... Accurate and lowcost sensor localization is a critical requirement for the deployment of wireless sensor networks in a wide variety of applications. Lowpower wireless sensors may be many hops away from any other sensors with a priori location information. In cooperative localization, sensors work ..."
Abstract

Cited by 305 (12 self)
 Add to MetaCart
together in a peertopeer manner to make measurements and then form a map of the network. Various application requirements (such as scalability, energy efficiency, and accuracy) will influence the design of sensor localization systems. In this article, we describe measurementbased statistical models
On the Length of Programs for Computing Finite Binary Sequences
 Journal of the ACM
, 1966
"... The use of Turing machines for calculating finite binary sequences is studied from the point of view of information theory and the theory of recursive functions. Various results are obtained concerning the number of instructions in programs. A modified form of Turing machine is studied from the same ..."
Abstract

Cited by 295 (8 self)
 Add to MetaCart
The use of Turing machines for calculating finite binary sequences is studied from the point of view of information theory and the theory of recursive functions. Various results are obtained concerning the number of instructions in programs. A modified form of Turing machine is studied from
Results 1  10
of
23,862