Sciweavers

383 search results - page 39 / 77
» The Study of 3D-from-2D Using Elimination
Sort
View
CSMR
2006
IEEE
14 years 4 months ago
Object-Oriented Legacy System Trace-based Logic Testing
When reengineering legacy systems, it is crucial to assess if the legacy behavior has been preserved or how it changed due to the reengineering effort. Ideally if a legacy system ...
Stéphane Ducasse, Tudor Gîrba, Roel W...
IEEECIT
2006
IEEE
14 years 3 months ago
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition
— User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...
ICMCS
2005
IEEE
116views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Video Object Boundary Reconstruction by 2-Pass Voting
In this paper we propose a voting-based object boundary reconstruction approach. Tensor voting has been studied by many people recently, and it can be used for boundary estimation...
Like Zhang, Qi Tian, Nicu Sebe, Jingsheng Ma
ACMACE
2005
ACM
14 years 3 months ago
Achieving fairness in multiplayer network games through automated latency balancing
Over the past few years, the prominence of multiplayer network gaming has increased dramatically in the Internet. The effect of network delay (lag) on multiplayer network gaming h...
Sebastian Zander, Ian Leeder, Grenville J. Armitag...
SIGECOM
2005
ACM
106views ECommerce» more  SIGECOM 2005»
14 years 3 months ago
On decentralized incentive compatible mechanisms
Algorithmic Mechanism Design focuses on Dominant Strategy Implementations. The main positive results are the celebrated Vickrey-Clarke-Groves (VCG) mechanisms and computationally ...
Ahuva Mu'alem