Microsoft Research Blog

English

  1. Light Reflection Function for Simulation of Clouds and Dusty Surfaces 

    January 1, 1982 | Jim Blinn

    The study of the physical process of light interacting with matter is an important part of computer image synthesis since it forms the basis for calculations of intensities in the picture. The simpler models used in the past are being augmented by more complex models…

  2. Password Authentication with Insecure Communication 

    November 5, 1981 | Leslie Lamport

    Despite a casual interest in civilian cryptography going back to its origins (see the discussion of [36]), this is my only publication in the field. It presents a cute hack for using a single password to login to a system multiple times without allowing an…

  3. Numerical shape from shading and occluding boundaries 

    July 31, 1981 | Katsushi Ikeuchi and Berthold K. P. Horn

    An iterative method for computing shape from shading using occluding boundary information is proposed. Some applications of this method are shown. We employ the stereographic plane to express the orientations of surface patches, rather than the more commonly used gradient space. Use of the stereographic…

  4. Current Dumping Analysis 

    March 1, 1981 | Henrique S. Malvar and Henrique S. Malvar

    This paper presents an analysis of Walker's "current dumping" technique, which combines feedback and feedforward to significantly reduce nonlinearity distortions in Class B amplifiers. Current dumping is thus a good alternative to Class AB designs, as it avoids biasing circuits that may need careful adjustment…

  5. Effect of reference set selection on speaker dependent speech recognition 

    January 5, 1981 | Zongge Li, Fil Alleva, and Raj Reedy

    Presented here for a speaker dependent system, is an algorithm which chooses a reference template for each word in the vocabulary from a set of N exemplars. The goal of the algorithm is to produce a reference set that minimizes the worst matching behavior and…

  6. An Ada-compatible specification language 

    January 1, 1981 | NCL Beale and Simon Peyton Jones

    This paper describes a notation for the formal specification of software packages. The main influences are the guarded commands of Dijkstra and the Algebraic Semantics of Guttag. However, a novel operator denoted by % is introduced, which allows algorithms to be abstracted in a specification,…

  7. Least-Squares Lowpass Filters with Nonmonotonic Response 

    December 1, 1980 | Luiz P. Caloba and Henrique S. Malvar

    A new class of all-pole filter functions, derived from the least-squares approximation technique, is introduced. The magintude response is compared with other all-pole filters, like the Butterworth, LSM, and Chebyshev ones. The three subclasses of the new class seem to be a suitable choice for…

  8. Timestamp-Based Algorithms for Concurrency Control in Distributed Database Systems 

    September 1, 1980 | Phil Bernstein and Nathan Goodman

    We decompose the problem of concurrency control into the sub-problems of read-write and write-write synchronization. We present a series of timestamp-based algorithms (called synchronization techniques) that achieve read-write and/or write-write synchronization. And we show how to combine any read-write technique with any write-write technique to…