Sciweavers

18374 search results - page 3556 / 3675
» Applications for data hiding
Sort
View
RT
2005
Springer
14 years 3 months ago
Estimation of 3D Faces and Illumination from Single Photographs Using A Bilinear Illumination Model
3D Face modeling is still one of the biggest challenges in computer graphics. In this paper we present a novel framework that acquires the 3D shape, texture, pose and illumination...
Jinho Lee, Hanspeter Pfister, Baback Moghaddam, Ra...
VLDB
2005
ACM
177views Database» more  VLDB 2005»
14 years 3 months ago
Discovering Large Dense Subgraphs in Massive Graphs
We present a new algorithm for finding large, dense subgraphs in massive graphs. Our algorithm is based on a recursive application of fingerprinting via shingles, and is extreme...
David Gibson, Ravi Kumar, Andrew Tomkins
VLDB
2005
ACM
90views Database» more  VLDB 2005»
14 years 3 months ago
Tuning Schema Matching Software using Synthetic Scenarios
Most recent schema matching systems assemble multiple components, each employing a particular matching technique. The domain user must then tune the system: select the right compo...
Mayssam Sayyadian, Yoonkyong Lee, AnHai Doan, Arno...
XPU
2005
Springer
14 years 3 months ago
Agile Methods for Embedded Systems
The main goal to be answered by this Ph.D. thesis is whether there is a potential for a successful and powerful application of agile methods and related techniques to embedded syst...
Dirk Wilking
ATAL
2005
Springer
14 years 3 months ago
Optimal status sets of heterogeneous agent programs
There are many situations where an agent can perform one of several sets of actions in responses to changes in its environment, and the agent chooses to perform the set of actions...
Bogdan Stroe, V. S. Subrahmanian, Sudeshna Dasgupt...
« Prev « First page 3556 / 3675 Last » Next »