Sciweavers

3686 search results - page 651 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
ECCV
2008
Springer
14 years 9 months ago
Flexible Depth of Field Photography
The range of scene depths that appear focused in an image is known as the depth of field (DOF). Conventional cameras are limited by a fundamental trade-off between depth of field a...
Hajime Nagahara, Sujit Kuthirummal, Changyin Zhou,...
SAB
2004
Springer
289views Optimization» more  SAB 2004»
14 years 1 months ago
An Overview of Physicomimetics
This paper provides an overview of our framework, called physicomimetics, for the distributed control of swarms of robots. We focus on robotic behaviors that are similar to those s...
William M. Spears, Diana F. Spears, Rodney Heil, W...
CGF
2002
184views more  CGF 2002»
13 years 7 months ago
The 3D Model Acquisition Pipeline
Three-dimensional (3D) image acquisition systems are rapidly becoming more affordable, especially systems based on commodity electronic cameras. At the same time, personal compute...
Fausto Bernardini, Holly E. Rushmeier
DAC
2008
ACM
14 years 8 months ago
Automated hardware-independent scenario identification
Scenario-based design exploits the time-varying execution behavior of applications by dynamically adapting the system on which they run. This is a particularly interesting design ...
Juan Hamers, Lieven Eeckhout
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 2 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp