Sciweavers

2913 search results - page 546 / 583
» How Much to Copy
Sort
View
CASES
2008
ACM
13 years 9 months ago
Reducing pressure in bounded DBT code caches
Dynamic binary translators (DBT) have recently attracted much attention for embedded systems. The effective implementation of DBT in these systems is challenging due to tight cons...
José Baiocchi, Bruce R. Childers, Jack W. D...
CCS
2008
ACM
13 years 9 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
3DIM
2005
IEEE
13 years 9 months ago
Bayesian Modelling of Camera Calibration and Reconstruction
Camera calibration methods, whether implicit or explicit, are a critical part of most 3D vision systems. These methods involve estimation of a model for the camera that produced t...
Rashmi Sundareswara, Paul R. Schrater
CLOR
2006
13 years 9 months ago
An Implicit Shape Model for Combined Object Categorization and Segmentation
We present a method for object categorization in real-world scenes. Following a common consensus in the field, we do not assume that a figure-ground segmentation is available prior...
Bastian Leibe, Ales Leonardis, Bernt Schiele
DOCENG
2005
ACM
13 years 9 months ago
Generative semantic clustering in spatial hypertext
This paper presents an iterative method for generative semantic clustering of related information elements in spatial hypertext documents. The goal is to automatically organize th...
Andruid Kerne, Eunyee Koh, Vikram Sundaram, J. Mic...