Sciweavers

4330 search results - page 856 / 866
» Analyzing security architectures
Sort
View
PICS
2000
13 years 8 months ago
CCD Requirements for Digital Photography
Digital photography has the potential to supersede conventional film photography. In order to realize this potential, digital photography needs to provide the best image quality a...
Richard L. Baer
WSC
1998
13 years 8 months ago
Applying Temporal Databases to HLA Data Collection and Analysis
The High Level Architecture (HLA) for distributed simulations was proposed by the Defense Modeling and Simulation Office of the Department of Defense (DOD) in order to support int...
Thom McLean, Leo Mark, Margaret L. Loper, David Ro...
CLEF
2010
Springer
13 years 7 months ago
Combination of Classifiers for Indoor Room Recognition CGS participation at ImageCLEF2010 Robot Vision Task
This paper represents a description of our approach to the problem of topological localization of a mobile robot using visual information. Our method has been developed for ImageCL...
Walter Lucetti, Emanuel Luchetti
ECRTS
2010
IEEE
13 years 7 months ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller
MM
2010
ACM
251views Multimedia» more  MM 2010»
13 years 7 months ago
A cognitive approach for effective coding and transmission of 3D video
Reliable delivery of 3D video contents to a wide set of users is expected to be the next big revolution in multimedia applications provided that it is possible to grant a certain ...
Simone Milani, Giancarlo Calvagno