Sciweavers

24188 search results - page 4792 / 4838
» Computing on Encrypted Data
Sort
View
CCR
2007
135views more  CCR 2007»
14 years 10 months ago
Future internet: fundamentals and measurement
While the Internet is hardly “broken”, it has proved unable to integrate new ideas, new architectures, and provide paths for future integration of data, voice, rich media and ...
Thrasyvoulos Spyropoulos, Serge Fdida, Scott Kirkp...
CGF
2007
149views more  CGF 2007»
14 years 10 months ago
Interactive Simulation of the Human Eye Depth of Field and Its Correction by Spectacle Lenses
This paper describes a fast rendering algorithm for verification of spectacle lens design. Our method simulates refraction corrections of astigmatism as well as myopia or presbyo...
Masanori Kakimoto, Tomoaki Tatsukawa, Yukiteru Muk...
CLEIEJ
2007
90views more  CLEIEJ 2007»
14 years 10 months ago
Software - Implemented Self-healing System
The term “Self-healing” denotes the capability of a software system in dealing with bugs. Fault tolerance for dependable computing is to provide the specified service through ...
Goutam Kumar Saha
CN
2007
89views more  CN 2007»
14 years 10 months ago
Determining an appropriate sending rate over an underutilized network path
Determining an appropriate sending rate when beginning data transmission into a network with unknown characteristics is a fundamental issue in best-effort networks. Traditionally,...
Pasi Sarolahti, Mark Allman, Sally Floyd
IJCV
2006
261views more  IJCV 2006»
14 years 10 months ago
Non-Rigid Stereo Factorization
In this paper we address the problem of recovering 3D non-rigid structure from a sequence of images taken with a stereo pair. We have extended existing non-rigid factorization algo...
Alessio Del Bue, Lourdes de Agapito
« Prev « First page 4792 / 4838 Last » Next »