Sciweavers

2846 search results - page 168 / 570
» Real World Teleconferencing
Sort
View
SMI
2008
IEEE
181views Image Analysis» more  SMI 2008»
14 years 3 months ago
Example based skeletonization using harmonic one-forms
This paper presents a method to extract skeletons using examples. Our method is based on the observation that many deformations in real world applications are isometric or near is...
Ying He 0001, Xian Xiao, Hock Soon Seah
IPC
2007
IEEE
14 years 3 months ago
Design and Validation of a Low-Power Network Node for Pervasive Applications
Pervasive computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To further increase...
Juan-Carlos Cano, Carlos Miguel Tavares Calafate, ...
ISMAR
2007
IEEE
14 years 3 months ago
Interactive Focus and Context Visualization for Augmented Reality
In this article we present interactive Focus and Context (F+C) visualizations for Augmented Reality (AR) applications. We demonstrate how F+C visualizations are used to affect the...
Denis Kalkofen, Erick Méndez, Dieter Schmal...
AUSAI
2007
Springer
14 years 3 months ago
The Detrimentality of Crossover
The traditional concept of a genetic algorithm (GA) is that of selection, crossover and mutation. However, a limited amount of data from the literature has suggested that the nich...
Andrew Czarn, Cara MacNish, Kaipillil Vijayan, Ber...
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 3 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang