Sciweavers

1539 search results - page 210 / 308
» Fast and Simple Methods For Computing Control Points
Sort
View
CIT
2004
Springer
14 years 2 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
ICIP
2006
IEEE
14 years 10 months ago
Rendering Synthetic Objects in Natural Scenes
We present a method for solving the light integral problem for synthetic diffuse objects rendered within a natural scene. The approach generates realistic shading using only a few...
Mais Alnasser, Hassan Foroosh
ECCV
2010
Springer
14 years 2 months ago
Visibility Subspaces: Uncalibrated Photometric Stereo with Shadows
Photometric stereo relies on inverting the image formation process, and doing this accurately requires reasoning about the visibility of light sources with respect to each image po...
PLILP
1994
Springer
14 years 1 months ago
Dynamic Dependence in Term rewriting Systems and its Application to Program Slicing
Abstract. Program slicing is a useful technique for debugging, testing, and analyzing programs. A program slice consists of the parts of a program which (potentially) affect the va...
John Field, Frank Tip
SIGGRAPH
1999
ACM
14 years 1 months ago
Multiresolution Mesh Morphing
We present a new method for user controlled morphing of two homeomorphic triangle meshes of arbitrary topology. In particular we focus on the problem of establishing a corresponde...
Aaron W. F. Lee, David P. Dobkin, Wim Sweldens, Pe...