Sciweavers

6656 search results - page 1094 / 1332
» Change, Change, Change: Three Approaches
Sort
View
MJ
2006
76views more  MJ 2006»
13 years 9 months ago
Reading the footprints of strained islands
We report on recent advances in the understanding of surface processes occurring during growth and post-growth annealing of strained islands which may find application as self-ass...
A. Rastelli, Mathieu Stoffel, G. Katsaros, J. Ters...
PAMI
2008
195views more  PAMI 2008»
13 years 9 months ago
Robust Radiometric Calibration and Vignetting Correction
In many computer vision systems, it is assumed that the image brightness of a point directly reflects the scene radiance of the point. However, the assumption does not hold in mos...
Seon Joo Kim, Marc Pollefeys
PERVASIVE
2008
Springer
13 years 9 months ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie
SCP
2008
144views more  SCP 2008»
13 years 9 months ago
Implicit ownership types for memory management
Abstract. The Real-time Specification for Java (RTSJ) introduced a range of language features for explicit memory management. While the RTSJ gives programmers fine control over mem...
Tian Zhao, Jason Baker, James Hunt, James Noble, J...
SAC
2006
ACM
13 years 9 months ago
Assisted verification of elementary functions using Gappa
The implementation of a correctly rounded or interval elementary function needs to be proven carefully in the very last details. The proof requires a tight bound on the overall er...
Florent de Dinechin, Christoph Quirin Lauter, Guil...
« Prev « First page 1094 / 1332 Last » Next »