Sciweavers

5539 search results - page 13 / 1108
» What can be computed locally
Sort
View
VSTTE
2005
Springer
14 years 3 months ago
WYSINWYX: What You See Is Not What You eXecute
What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs that are generated from source code. Not only can the WYSINW...
Gogul Balakrishnan, Thomas W. Reps, David Melski, ...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 4 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
KDID
2003
144views Database» more  KDID 2003»
13 years 11 months ago
What You Store is What You Get
d abstract) Floris Geerts, Bart Goethals, and Taneli Mielik¨ainen HIIT Basic Research Unit Department of Computer Science University of Helsinki, Finland Abstract. Recent studies ...
Floris Geerts, Bart Goethals, Taneli Mielikäi...
PERCOM
2005
ACM
14 years 9 months ago
Traditional Systems Can Work Well for Pervasive Applications. A Case Study: Plan 9 from Bell Labs Becomes Ubiquitous
There is a huge effort in ongoing research on new middleware platforms and new distributed services to support ubiquitous environments and pervasive applications. Most research pr...
Francisco J. Ballesteros, Gorka Guardiola Muzquiz,...
CRV
2007
IEEE
145views Robotics» more  CRV 2007»
14 years 4 months ago
Can Lucas-Kanade be used to estimate motion parallax in 3D cluttered scenes?
When an observer moves in a 3D static scene, the motion field depends on the depth of the visible objects and on the observer’s instantaneous translation and rotation. By compu...
Vincent Chapdelaine-Couture, Michael S. Langer