Sciweavers

3305 search results - page 146 / 661
» Can we Rely on SQL
Sort
View
ECCV
2010
Springer
14 years 3 months ago
Visibility Subspaces: Uncalibrated Photometric Stereo with Shadows
Photometric stereo relies on inverting the image formation process, and doing this accurately requires reasoning about the visibility of light sources with respect to each image po...
APN
2009
Springer
14 years 2 months ago
P-Semiflow Computation with Decision Diagrams
We present a symbolic method for p-semiflow computation, based on zero-suppressed decision diagrams. Both the traditional explicit methods and our new symbolic method rely on Farka...
Gianfranco Ciardo, Galen Mecham, Emmanuel Paviot-A...
GLOBECOM
2009
IEEE
14 years 2 months ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca
CCS
2006
ACM
14 years 2 months ago
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay a...
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O...
EPEW
2006
Springer
14 years 8 days ago
The Impact of Buffer Finiteness on the Loss Rate in a Priority Queueing System
This paper discusses five different ways to approximate the loss rate in a fundamental two class priority system, where each class has its own finite capacity buffer, as well as an...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...