Sciweavers

20831 search results - page 4040 / 4167
» Quantum Computation and Information
Sort
View
IWIA
2005
IEEE
14 years 3 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
VISUALIZATION
2005
IEEE
14 years 3 months ago
A Shader-Based Parallel Rendering Framework
Existing parallel or remote rendering solutions rely on communicating pixels, OpenGL commands, scene-graph changes or application-specific data. We propose an intermediate soluti...
Jérémie Allard, Bruno Raffin
WACV
2005
IEEE
14 years 3 months ago
Deformation Analysis for 3D Face Matching
Current two-dimensional image based face recognition systems encounter difficulties with large facial appearance variations due to the pose, illumination and expression changes. ...
Xiaoguang Lu, Anil K. Jain
JCDL
2005
ACM
111views Education» more  JCDL 2005»
14 years 3 months ago
Digitization and 3D modeling of movable books
Movable books provide interesting challenges for digitization and user interfaces design. We report in this paper some preliminary results in the building of a 3D visualization wo...
Pierre Cubaud, Jérôme Dupire, Alexand...
MM
2005
ACM
103views Multimedia» more  MM 2005»
14 years 3 months ago
Simulated virtual market place by using voiscape communication medium
We are developing a new voice communication medium called voiscape. Voiscape enables natural and seamless bi-directional voice communication by using sound to create a virtual sou...
Yasusi Kanada
« Prev « First page 4040 / 4167 Last » Next »