Sciweavers

1042 search results - page 56 / 209
» Failing First: An Update
Sort
View
146
Voted
IJCV
2006
218views more  IJCV 2006»
15 years 4 months ago
Stabilizing the Focal Length Computation for 3-D Reconstruction from Two Uncalibrated Views
In order to reconstruct 3-D shape from two uncalibrated views, one needs to resolve two problems: (i) the computed focal lengths can be imaginary; (ii) the computation fails for fi...
Ken-ichi Kanatani, Atsutada Nakatsuji, Yasuyuki Su...
IJWMC
2006
112views more  IJWMC 2006»
15 years 4 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
TVCG
2008
135views more  TVCG 2008»
15 years 4 months ago
A Fast and Stable Penalty Method for Rigid Body Simulation
Two methods have been used extensively to model resting contact for rigid body simulation. The first approach, the penalty method, applies virtual springs to surfaces in contact to...
Evan Drumwright
CONCURRENCY
2000
70views more  CONCURRENCY 2000»
15 years 4 months ago
Javelin++: scalability issues in global computing
Javelin is a Java-based infrastructure for global computing. This paper presents Javelin++, an extension of Javelin, intended to support a much larger set of computational hosts. ...
Michael O. Neary, Sean P. Brydon, Paul Kmiec, Sami...
CCR
1998
107views more  CCR 1998»
15 years 4 months ago
Reinforcement of TCP error recovery for wireless communication
When a wireless link forms a part of a network, the rate of packet loss due to link noise may be considerably higher than observed in a modern terrestrial network. This paper stud...
Nihal K. G. Samaraweera, Godred Fairhurst