Sciweavers

3092 search results - page 454 / 619
» Where are you pointing
Sort
View
CGF
2007
145views more  CGF 2007»
13 years 10 months ago
Bitmask Soft Shadows
Recently, several real-time soft shadow algorithms have been introduced which all compute a single shadow map and use its texels to obtain a discrete scene representation. The res...
Michael Schwarz, Marc Stamminger
IR
2008
13 years 10 months ago
A compressed self-index using a Ziv-Lempel dictionary
A compressed full-text self-index for a text T , of size u, is a data structure used to search for patterns P, of size m, in T , that requires reduced space, i.e. space that depend...
Luís M. S. Russo, Arlindo L. Oliveira
IJCV
2006
110views more  IJCV 2006»
13 years 10 months ago
Multi-body Factorization with Uncertainty: Revisiting Motion Consistency
Dynamic analysis of video sequences often relies on the segmentation of the sequence into regions of consistent motions. Approaching this problem requires a definition of which mo...
Lihi Zelnik-Manor, Moshe Machline, Michal Irani
IJNSEC
2006
71views more  IJNSEC 2006»
13 years 10 months ago
Joint Sparse Form of Window Three for Koblitz Curve
The joint sparse form (JSF) for the non-adjacent form (NAF) representation of two large integers a and b, was proposed by Solinas. Then Ciet extended it to the -JSF for the -NAF r...
Yong Ding, Kwok-Wo Wong, Yu-Min Wang
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 10 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park