Research Statement Adam Bargteil

نویسنده

  • Adam Bargteil
چکیده

While exploding trucks and collapsing buildings are rare occurrences in everyday life, they are frequently depicted in films, video games, and training simulations. Filming such effects in the real world can be dangerous and obtaining a specific outcome is often difficult. Consequently, such effects are increasingly generated through physical simulations where initial conditions and parameters can be tuned to produce the desired effect. My research has focused on developing tools that allow artists to create high-quality, realistic, visually-detailed animations of complex materials for applications in computer graphics.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tracking and Texturing Liquid Surfaces

Tracking and Texturing Liquid Surfaces

متن کامل

Quantifying Network Denial of Service: A Location Service Case Study

Network Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication, making it desirable to measure the resilience of systems to DoS attacks. In this paper, we propose a simulation-based methodology and apply it to attacks on object location services such as DNS. Our results allow us to contrast the DoS resilience of three distinct architectures for object location.

متن کامل

Basis enrichment and solid-fluid coupling for model-reduced fluid simulation

We present several enhancements to model-reduced fluid simulation that allow improved simulation bases and twoway solid-fluid coupling. Specifically, we present a basis enrichment scheme that allows us to combine data driven or artistically derived bases with more general analytic bases derived from Laplacian Eigenfunctions. We handle two-way solid-fluid coupling in a time-splitting fashion— we...

متن کامل

Quantitative Characterization of Denial of Service: A Location Service Case Study

Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication. Most previous work has focused on DoS attacks which take advantage of a protocol to launch the attack. We take the view that DoS attack is any malicious action which reduces the availability of some resource to some users. We set as a goal a general methodology for measuring the resilience of a system to b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008