Sciweavers

2250 search results - page 398 / 450
» Authorizing applications in singularity
Sort
View
AMFG
2005
IEEE
146views Biometrics» more  AMFG 2005»
15 years 3 months ago
A Practical Face Relighting Method for Directional Lighting Normalization
We propose a simplified and practical computational technique for estimating directional lighting in uncalibrated images of faces in frontal pose. We show that this inverse probl...
Kuang-Chih Lee, Baback Moghaddam
CODES
2005
IEEE
15 years 3 months ago
Comparing two testbench methods for hierarchical functional verification of a bluetooth baseband adaptor
The continuous improvement on the design methodologies and processes has made possible the creation of huge and very complex digital systems. Design verification is one of the mai...
Edgar L. Romero, Marius Strum, Wang Jiang Chau
FOCS
2005
IEEE
15 years 3 months ago
How to Pay, Come What May: Approximation Algorithms for Demand-Robust Covering Problems
Robust optimization has traditionally focused on uncertainty in data and costs in optimization problems to formulate models whose solutions will be optimal in the worstcase among ...
Kedar Dhamdhere, Vineet Goyal, R. Ravi, Mohit Sing...
ICDCSW
2005
IEEE
15 years 3 months ago
DiamondHelp: A Collaborative Interface Framework for Networked Home Appliances
DiamondHelp is a reusable Java framework for building graphical user interfaces based on the collaborative paradigm of human-computer interaction. DiamondHelp´s graphical design ...
Charles Rich, Candy L. Sidner, Neal Lesh, Andrew G...
RTSS
2005
IEEE
15 years 3 months ago
Enhanced EDF Scheduling Algorithms for Orchestrating Network-Wide Active Measurements
Monitoring network status such as end-to-end delay, jitter, and available bandwidth is important to support QoS-sensitive applications and timely detection of network anomalies li...
Prasad Calyam, Chang-Gun Lee, Phani Kumar Arava, D...