Sciweavers

953 search results - page 82 / 191
» Constraint Based Transformation Theory
Sort
View
ICCV
2005
IEEE
15 years 11 months ago
Can Two Specular Pixels Calibrate Photometric Stereo?
Lambertian photometric stereo with unknown light source parameters is ambiguous. Provided that the object imaged constitutes a surface, the ambiguity is represented by the group o...
Ondrej Drbohlav, Mike J. Chantler
MOC
2010
14 years 4 months ago
Convergence analysis of the Jacobi spectral-collocation methods for Volterra integral equations with a weakly singular kernel
In this paper, a Jacobi-collocation spectral method is developed for Volterra integral equations of the second kind with a weakly singular kernel. We use some function transformati...
Yanping Chen, Tao Tang
DRM
2007
Springer
15 years 4 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
COMPSAC
2008
IEEE
14 years 11 months ago
An Intelligent Control Architecture for Adaptive Service-Based Software Systems with Workflow Patterns
Service-oriented architecture (SOA) for distributed computing has become increasingly popular due to the great advantage that distributed applications can be rapidly synthesized w...
Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Dazhi Huang...
TON
2002
76views more  TON 2002»
14 years 9 months ago
Some properties of variable length packet shapers
The min-plus theory of greedy shapers has been developed after Cruz's results on the calculus of network delays. An example of greedy shaper is the buffered leaky bucket cont...
Jean-Yves Le Boudec