Sciweavers

5220 search results - page 1028 / 1044
» Changing Persistent Applications
Sort
View
153
Voted
IJCV
1998
233views more  IJCV 1998»
15 years 1 months ago
A Level-Set Approach to 3D Reconstruction from Range Data
This paper presents a method that uses the level sets of volumes to reconstruct the shapes of 3D objects from range data. The strategy is to formulate 3D reconstruction as a stati...
Ross T. Whitaker
COMCOM
1999
164views more  COMCOM 1999»
15 years 1 months ago
Support QoS in IP over ATM
An integrated service internet running real-time and multimedia applications is rapidly becoming a reality. Meanwhile, ATM technology is appearing in the marketplace. It is an imp...
Gung-Chou Lai, Ruay Shiung Chang
PE
2002
Springer
158views Optimization» more  PE 2002»
15 years 1 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
SPE
1998
129views more  SPE 1998»
15 years 1 months ago
Timing Trials, or the Trials of Timing: Experiments with Scripting and User-Interface Languages
This paper describes some basic experiments to see how fast various popular scripting and user-interface languages run on a spectrum of representative tasks. We found enormous var...
Brian W. Kernighan, Christopher J. Van Wyk
TMI
1998
137views more  TMI 1998»
15 years 1 months ago
Dynamic Imaging and Tracer Kinetic Modeling for Emission Tomography Using Rotating Detectors
— When performing dynamic studies using emission tomography the tracer distribution changes during acquisition of a single set of projections. This is particularly true for some ...
Chi-Hoi Lau, David Dagan Feng, Brian F. Hutton, Da...
« Prev « First page 1028 / 1044 Last » Next »