Sciweavers

298 search results - page 39 / 60
» Computer security: quality rather than quantity
Sort
View
ACSC
2005
IEEE
14 years 3 months ago
Fractal Image Compression on a Pseudo Spiral Architecture
Fractal image compression is a relatively recent image compression method which exploits similarities in different parts of the image. The basic idea is to represent an image by f...
Huaqing Wang, Meiqing Wang, Tom Hintz, Xiangjian H...
SI3D
2005
ACM
14 years 3 months ago
Interactive deformation of light fields
We present a software pipeline that enables an animator to deform light fields. The pipeline can be used to deform complex objects, such as furry toys, while maintaining photo-re...
Billy Chen, Eyal Ofek, Heung-Yeung Shum, Marc Levo...
ICCSA
2005
Springer
14 years 3 months ago
Variability Design and Customization Mechanisms for COTS Components
Component-Based Development (CBD) is gaining popularity as an effective reuse technology. Components in CBD are mainly for interorganizational reuse, rather than intra-organization...
Soo Dong Kim, Hyun Gi Min, Sung Yul Rhew
MOBIHOC
2000
ACM
14 years 2 months ago
Role-based multicast in highly mobile but sparsely connected ad hoc networks
— We present an approach to multicasting messages among highly mobile hosts in ad hoc networks. We suggest a new definition of a role-based multicast that suits the special need...
Linda Briesemeister, Günter Hommel
NAACL
2010
13 years 7 months ago
Learning Translation Boundaries for Phrase-Based Decoding
Constrained decoding is of great importance not only for speed but also for translation quality. Previous efforts explore soft syntactic constraints which are based on constituent...
Deyi Xiong, Min Zhang, Haizhou Li