Sciweavers

181 search results - page 15 / 37
» Knowledge Provenance
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks
—In this paper, we study the problem of constructing full-coverage three dimensional networks with multiple connectivity. We design a set of patterns for full coverage and two re...
Xiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia
ECOOP
2008
Springer
13 years 10 months ago
A Model for Java with Wildcards
Wildcards are a complex and subtle part of the Java type system, present since version 5.0. Although there have been various formalisations and partial type soundness results conce...
Nicholas R. Cameron, Sophia Drossopoulou, Erik Ern...
ICMCS
2007
IEEE
126views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Hierarchical Blind Watermarking of 3D Triangular Meshes
An original hierarchical watermarking scheme is proposed in this paper. A geometrically robust watermark and a high-capacity watermark are inserted in different resolution levels ...
Kai Wang, Guillaume Lavoué, Florence Denis,...
ICIP
2008
IEEE
14 years 10 months ago
Hybrid tracking approach using optical flow and pose estimation
This paper proposes an hybrid approach to estimate the 3D pose of an object. The integration of texture information based on image intensities in a more classical non-linear edge-...
Éric Marchand, Étienne Mémin,...
ICSE
2009
IEEE-ACM
14 years 3 months ago
Can peer code reviews be exploited for later information needs?
Code reviews have proven to be an effective means of improving overall software quality. During the review, there is an exchange of knowledge between the code author and reviewer ...
Andrew Sutherland, Gina Venolia