Sciweavers

1529 search results - page 256 / 306
» A slant removal algorithm
Sort
View
ACSC
2010
IEEE
13 years 3 months ago
Measuring visual consistency in 3d rendering systems
One of the major challenges facing a present day game development company is the removal of bugs from such complex virtual environments. This work presents an approach for measuri...
Alfredo Nantes, Ross Brown, Frédéric...
TSP
2011
197views more  TSP 2011»
13 years 3 months ago
Group Object Structure and State Estimation With Evolving Networks and Monte Carlo Methods
—This paper proposes a technique for motion estimation of groups of targets based on evolving graph networks. The main novelty over alternative group tracking techniques stems fr...
Amadou Gning, Lyudmila Mihaylova, Simon Maskell, S...
ITIIS
2010
247views more  ITIIS 2010»
13 years 3 months ago
An Efficient Overlay for Unstructured P2P File Sharing over MANET using Underlying Cluster-based Routing
In traditional unstructured P2P file sharing network, each peer establishes connections with a certain number of randomly chosen other peers. This would lead to redundant traffic ...
Nadir Shah, Depei Qian
JDCTA
2010
226views more  JDCTA 2010»
13 years 3 months ago
An Automatic-Pre-processing Method For Mammographic Images
Screening mammography represents the technique adopted to detect breast cancer at an early stage. However the presence of artifacts and pectoral muscle can disturb the detection o...
Ali Cherif Chaabani, Atef Boujelben, Adel Mahfoudh...
TSE
2010
230views more  TSE 2010»
13 years 3 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...