Sciweavers

4190 search results - page 727 / 838
» Type Class Directives
Sort
View
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 8 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
CIS
2008
Springer
15 years 8 months ago
Multiperspective Modeling and Rendering Using General Linear Cameras
We present a General Linear Camera (GLC) model that unifies many previous camera models into a single representation. The GLC model is capable of describing all perspective (pinhol...
Jingyi Yu, Yuanyuan Ding, and Leonard McMillan
127
Voted
CODES
2006
IEEE
15 years 8 months ago
Integrated analysis of communicating tasks in MPSoCs
Predicting timing behavior is key to efficient embedded real-time system design and verification. Especially memory accesses and co-processor calls over shared communication net...
Simon Schliecker, Matthias Ivers, Rolf Ernst
GMP
2006
IEEE
155views Solid Modeling» more  GMP 2006»
15 years 8 months ago
Geometric Accuracy Analysis for Discrete Surface Approximation
In geometric modeling and processing, computer graphics and computer vision, smooth surfaces are approximated by discrete triangular meshes reconstructed from sample points on the...
Junfei Dai, Wei Luo, Shing-Tung Yau, Xianfeng Gu
IPPS
2006
IEEE
15 years 8 months ago
Supporting self-adaptation in streaming data mining applications
There are many application classes where the users are flexible with respect to the output quality. At the same time, there are other constraints, such as the need for real-time ...
Liang Chen, Gagan Agrawal