Sciweavers

4217 search results - page 785 / 844
» The Small Model Property: How Small Can It Be
Sort
View
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 3 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
ECCV
1998
Springer
14 years 11 months ago
Shape Representations from Shading Primitives
Diffuse interreflections mean that surface shading and shape are related in ways that are difficult to untangle; in particular, distant and invisible surfaces may affect the shadi...
John A. Haddon, David A. Forsyth
EUROSYS
2010
ACM
14 years 2 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
ICCV
2003
IEEE
14 years 11 months ago
Tales of Shape and Radiance in Multi-view Stereo
To what extent can three-dimensional shape and radiance be inferred from a collection of images? Can the two be estimated separately while retaining optimality? How should the opt...
Stefano Soatto, Anthony J. Yezzi, Hailin Jin
CP
2009
Springer
14 years 9 months ago
Constraint-Based Optimal Testing Using DNNF Graphs
The goal of testing is to distinguish between a number of hypotheses about a systemfor example, dierent diagnoses of faults by applying input patterns and verifying or falsifying t...
Anika Schumann, Martin Sachenbacher, Jinbo Huang