Sciweavers

CGF
2006
126views more  CGF 2006»
13 years 11 months ago
Soft Shadow Maps: Efficient Sampling of Light Source Visibility
Shadows, particularly soft shadows, play an important role in the visual perception of a scene by providing visual cues about the shape and position of objects. Several recent alg...
Lionel Atty, Nicolas Holzschuch, Marc Lapierre, Je...
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 11 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ICASSP
2010
IEEE
13 years 11 months ago
Partial sequence matching using an Unbounded Dynamic Time Warping algorithm
Before the advent of Hidden Markov Models(HMM)-based speech recognition, many speech applications were built using pattern matching algorithms like the Dynamic Time Warping (DTW) ...
Xavier Anguera, Robert Macrae, Nuria Oliver
CSC
2006
14 years 1 months ago
Computational Algorithm for Higher Order Legendre Polynomial and Gaussian Quadrature Method
: - There are many numerical methods adopted to solve mathematical problems. Early researchers focused on the methods to reduce computational costs. In recent years, reduction in c...
Asif Mughal, Xiu Ye, Kamran Iqbal
ICMCS
2005
IEEE
111views Multimedia» more  ICMCS 2005»
14 years 5 months ago
An audio spread-spectrum data hiding system with an informed embedding strategy adapted to a Wiener filtering based receiver
A particular application of audio data hiding systems and watermarking systems consists of using the audio signal as a transmission channel for binary information. The system shou...
Cléo Baras, Nicolas Moreau
CLUSTER
2005
IEEE
14 years 5 months ago
Toward an Optimal Redundancy Strategy for Distributed Computations
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The related computation integrity concerns are commonly...
Doug Szajda, Barry Lawson, Jason Owen