Sciweavers

21108 search results - page 3978 / 4222
» A General Class of Models of
Sort
View
117
Voted
IJCV
2006
159views more  IJCV 2006»
15 years 22 days ago
Wide Baseline Matching between Unsynchronized Video Sequences
3D reconstruction of a dynamic scene from features in two cameras usually requires synchronization and correspondences between the cameras. These may be hard to achieve due to occl...
Lior Wolf, Assaf Zomet
97
Voted
IJHPCN
2006
106views more  IJHPCN 2006»
15 years 22 days ago
Performance evaluation of the Sun Fire Link SMP clusters
As symmetric multiprocessors become commonplace, the interconnection networks and the communication system software in clusters of multiprocessors become critical to achieving high...
Ying Qian, Ahmad Afsahi, Nathan R. Fredrickson, Re...
94
Voted
JCP
2008
116views more  JCP 2008»
15 years 21 days ago
Sensor Location Strategy in Large-Scale Systems for Fault Detection Applications
Fault detection in large-scale systems is conducted by the use of sensors, thus the sensor location influences the performances of fault detection directly. As the scale of systems...
Fan Yang, Deyun Xiao
ISI
2006
Springer
15 years 21 days ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
105
Voted
JUCS
2008
113views more  JUCS 2008»
15 years 21 days ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
« Prev « First page 3978 / 4222 Last » Next »