Sciweavers

55 search results - page 2 / 11
» Feasible Depth
Sort
View
CN
2006
79views more  CN 2006»
13 years 5 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
ICPR
2006
IEEE
13 years 11 months ago
Extending the Depth of Field in a Compound-Eye Imaging System with Super-Resolution Reconstruction
Optical device miniaturization is highly desirable in many applications. Direct down-scaling of traditional imaging system is one approach, but the extent to which it can be minim...
Wai-San Chan, Edmund Y. Lam, Michael K. Ng
COCO
1999
Springer
79views Algorithms» more  COCO 1999»
13 years 10 months ago
Non-Automatizability of Bounded-Depth Frege Proofs
In this paper, we show how to extend the argument due to Bonet, Pitassi and Raz to show that bounded-depth Frege proofs do not have feasible interpolation, assuming that factoring...
Maria Luisa Bonet, Carlos Domingo, Ricard Gavald&a...
BC
2006
73views more  BC 2006»
13 years 5 months ago
Depth estimation using the compound eye of dipteran flies
In the neural superposition eye of a dipteran fly every ommatidium has eight photoreceptors, each associated with a rhabdomere, two central and six peripheral, which altogether res...
Konstantinos Bitsakos, Cornelia Fermüller
PRESENCE
2002
129views more  PRESENCE 2002»
13 years 5 months ago
Share-Z: Client/Server Depth Sensing for See-Through Head-Mounted Displays
In mixed reality, occlusions and shadows are important to realize a natural fusion between the real and virtual worlds. In order to achieve this, it is necessary to acquire dense ...
Yuichi Ohta, Yasuyuki Sugaya, Hiroki Igarashi, Tos...