Sciweavers

4004 search results - page 67 / 801
» How Many Packets Can We Encode
Sort
View
HLK
2003
IEEE
15 years 7 months ago
Extraction, matching and pose recovery based on dominant rectangular structures
Man-made environments possess many regularities which can be efficiently exploited for image based rendering as well as robotic visual navigation and localization tasks. In this ...
Wei Zhang, Jana Kosecká
DEBU
2010
129views more  DEBU 2010»
14 years 12 months ago
Flash in a DBMS: Where and How?
Over the past decade, new solid state storage technologies, with flash being the most mature one, have become increasingly popular. Such technologies store data durably, and can a...
Manos Athanassoulis, Anastasia Ailamaki, Shimin Ch...
DPPI
2007
ACM
15 years 6 months ago
How probes inform and influence the design process
Design and research practitioners have applied probes in their design processes to find new ways of understanding user experience, allowing them to obtain a better understanding of...
Andrés Lucero, Tatiana Lashina, Elmo M. A. ...
ACTA
2000
92views more  ACTA 2000»
15 years 2 months ago
How to Calculate Symmetries of Petri Nets
Symmetric net structure yields symmetric net behaviour. Thus, knowing the symmetries of a net, redundant calculations can be skipped. We present a framework for the calculation of ...
Karsten Schmidt 0004
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 6 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...