Sciweavers

1898 search results - page 118 / 380
» Weak Keys for IDEA
Sort
View
OOPSLA
2007
Springer
14 years 3 months ago
Combining structural subtyping and external dispatch
Nominal subtyping (or user-defined subtyping) and structural subtyping each have their own strengths and weaknesses. Nominal subtyping allows programmers to explicitly express de...
Donna Malayeri
PAM
2007
Springer
14 years 3 months ago
Routing Stability in Static Wireless Mesh Networks
Considerable research has focused on the design of routing protocols for wireless mesh networks. Yet, little is understood about the stability of routes in such networks. This unde...
Krishna N. Ramachandran, Irfan Sheriff, Elizabeth ...
IPPS
2006
IEEE
14 years 2 months ago
Checkpointing and rollback-recovery protocol for mobile systems with MW session guarantee
In the mobile environment, weak consistency replication of shared data is the key to obtaining high data availability, good access performance, and good scalability. Therefore new...
Jerzy Brzezinski, Anna Kobusinska, Michal Szychowi...
ACCV
2006
Springer
14 years 2 months ago
A Local Basis Representation for Estimating Human Pose from Cluttered Images
Recovering the pose of a person from single images is a challenging problem. This paper discusses a bottom-up approach that uses local image features to estimate human upper body p...
Ankur Agarwal, Bill Triggs
ACCV
2006
Springer
14 years 2 months ago
Vision Based Speech Animation Transferring with Underlying Anatomical Structure
We present a novel method to transfer speech animation recorded in low resolution videos onto realistic 3D facial models. Unsupervised learning is utilized on a speech video corpus...
Yuru Pei, Hongbin Zha