Sciweavers

1141 search results - page 184 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
136
Voted
SMA
2006
ACM
101views Solid Modeling» more  SMA 2006»
15 years 10 months ago
A higher dimensional formulation for robust and interactive distance queries
We present an efficient and robust algorithm for computing the minimum distance between a point and freeform curve or surface by lifting the problem into a higher dimension. This...
Joon-Kyung Seong, David E. Johnson, Elaine Cohen
TASLP
2010
167views more  TASLP 2010»
14 years 11 months ago
Broadband Source Localization From an Eigenanalysis Perspective
Abstract--Broadband source localization has several applications ranging from automatic video camera steering to target signal tracking and enhancement through beamforming. Consequ...
Mehrez Souden, Jacob Benesty, Sofiène Affes
NDSS
2008
IEEE
15 years 10 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
CGF
2007
101views more  CGF 2007»
15 years 4 months ago
Consistent Viewing and Interaction for Multiple Users in Projection-Based VR Systems
In projection-based Virtual Reality (VR) systems, typically only one headtracked user views stereo images rendered from the correct view position. For other users, who are present...
Gerwin de Haan, Rene Molenaar, Michal Koutek, Frit...
ISAAC
2009
Springer
142views Algorithms» more  ISAAC 2009»
15 years 10 months ago
Of Choices, Failures and Asynchrony: The Many Faces of Set Agreement
Abstract. Set agreement is a fundamental problem in distributed computing in which processes collectively choose a small subset of values from a larger set of proposals. The imposs...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Core...