Author of the publication

Using particles to sample and control more complex implicit surfaces.

, , , and . SIGGRAPH Courses, page 269. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CyberInfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment., , , , , , , , , and 2 other author(s). CLADE, page 25-33. IEEE Computer Society, (2006)Federated login to TeraGrid., , and . IDtrust, page 1-11. ACM, (2010)Towards A Taxonomy Of Attacks Against Energy Control Systems., , and . Critical Infrastructure Protection, volume 290 of IFIP Advances in Information and Communication Technology, page 71-85. Springer, (2008)Custos: Security Middleware for Science Gateways., , , , , , , , , and 2 other author(s). PEARC, page 278-284. ACM, (2020)Single sign-on for java web start applications using myproxy., , and . SWS, page 95-102. ACM, (2006)CILogon: a federated X.509 certification authority for cyberinfrastructure logon., , and . XSEDE, page 53:1-53:7. ACM, (2013)Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory., , and . DependSys, page 119-126. IEEE, (2020)Observatory Middleware Framework., , , , , , and . eScience, page 366-367. IEEE Computer Society, (2008)Trusted CI Experiences in Cybersecurity and Service to Open Science., , , , , , , , , and 9 other author(s). PEARC, page 60. ACM, (2019)