Sciweavers

55 search results - page 2 / 11
» Feasible Depth
Sort
View
CN
2006
79views more  CN 2006»
13 years 8 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
ICPR
2006
IEEE
14 years 2 months ago
Extending the Depth of Field in a Compound-Eye Imaging System with Super-Resolution Reconstruction
Optical device miniaturization is highly desirable in many applications. Direct down-scaling of traditional imaging system is one approach, but the extent to which it can be minim...
Wai-San Chan, Edmund Y. Lam, Michael K. Ng
COCO
1999
Springer
79views Algorithms» more  COCO 1999»
14 years 20 days ago
Non-Automatizability of Bounded-Depth Frege Proofs
In this paper, we show how to extend the argument due to Bonet, Pitassi and Raz to show that bounded-depth Frege proofs do not have feasible interpolation, assuming that factoring...
Maria Luisa Bonet, Carlos Domingo, Ricard Gavald&a...
BC
2006
73views more  BC 2006»
13 years 8 months ago
Depth estimation using the compound eye of dipteran flies
In the neural superposition eye of a dipteran fly every ommatidium has eight photoreceptors, each associated with a rhabdomere, two central and six peripheral, which altogether res...
Konstantinos Bitsakos, Cornelia Fermüller
PRESENCE
2002
129views more  PRESENCE 2002»
13 years 8 months ago
Share-Z: Client/Server Depth Sensing for See-Through Head-Mounted Displays
In mixed reality, occlusions and shadows are important to realize a natural fusion between the real and virtual worlds. In order to achieve this, it is necessary to acquire dense ...
Yuichi Ohta, Yasuyuki Sugaya, Hiroki Igarashi, Tos...