Sciweavers

1486 search results - page 246 / 298
» Algorithms for two-box covering
Sort
View
NETGAMES
2004
ACM
14 years 1 months ago
Realizing bullet time effect in multiplayer games with local perception filters
Local perception filters exploit the limitations of human perception to reduce the effects of network latency in multiplayer computer games. Because they allow temporal distorti...
Jouni Smed, Henrik Niinisalo, Harri Hakonen
ICMI
2004
Springer
152views Biometrics» more  ICMI 2004»
14 years 1 months ago
Exploiting prosodic structuring of coverbal gesticulation
Although gesture recognition has been studied extensively, communicative, affective, and biometrical “utility” of natural gesticulation remains relatively unexplored. One of t...
Sanshzar Kettebekov
IH
2004
Springer
14 years 1 months ago
On the Possibility of Non-invertible Watermarking Schemes
Recently, there are active discussions on the possibility of non-invertible watermarking scheme. A non-invertible scheme prevents an attacker from deriving a valid watermark from a...
Qiming Li, Ee-Chien Chang
RAID
2004
Springer
14 years 1 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
ICDAR
2003
IEEE
14 years 1 months ago
Numeral recognition for quality control of surgical sachets
In this paper we describe an application of OCR techniques to quality control in industrial production. The purpose of the system is to verify the correct printing of numerical in...
Ernest Valveny, Antonio López