Sciweavers

50 search results - page 10 / 10
» From lines to epipoles through planes in two views
Sort
View
GRAPHICSINTERFACE
2007
13 years 6 months ago
Feature peeling
We present a novel rendering algorithm that analyses the ray profiles along the line of sight. The profiles are subdivided according to encountered peaks and valleys at so calle...
Muhammad Muddassir Malik, Torsten Möller, M. ...
SPLC
2008
13 years 6 months ago
Reconciling Automation and Flexibility in Product Derivation
Product derivation, i.e. reusing core assets to build products, did not receive sufficient attention from the productline community, yielding a frustrating situation. On the one h...
Gilles Perrouin, Jacques Klein, Nicolas Guelfi, Je...
INFOCOM
2009
IEEE
13 years 11 months ago
Noncooperative Load Balancing in the Continuum Limit of a Dense Network
Abstract—In transportation network research, the main approach for predicting traffic distribution due to noncooperative vehicle choices has been through fluid type models. The...
Eitan Altman, Ishai Menache, Asuman E. Ozdaglar
MINENET
2006
ACM
13 years 11 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
13 years 10 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor