Sciweavers

1773 search results - page 320 / 355
» Depth from Diffusion
Sort
View
98
Voted
ASSETS
2005
ACM
15 years 2 months ago
Verification of computer display pre-compensation for visual aberrations in an artificial eye
The possibility of pre-compensating images in a computer display according to the visual aberrations previously assessed in an optical system (e.g., the computer user’s eye) has...
Miguel Alonso Jr., Armando Barreto, Julie A. Jacko...
FSE
2008
Springer
193views Cryptology» more  FSE 2008»
15 years 2 months ago
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
The stream cipher Salsa20 was introduced by Bernstein in 2005 as a candidate in the eSTREAM project, accompanied by the reduced versions Salsa20/8 and Salsa20/12. ChaCha is a varia...
Jean-Philippe Aumasson, Simon Fischer 0002, Shahra...
94
Voted
BLISS
2009
IEEE
15 years 1 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
97
Voted
ALIFE
2008
15 years 25 days ago
A Model of the Quorum Sensing System in Vibrio fischeri Using P Systems
Quorum sensing is a cell density dependent gene regulation system that allows an entire population of bacterial cells to communicate in order to regulate the expression of certain ...
Francisco José Romero-Campero, Mario J. P&e...
CORR
2010
Springer
82views Education» more  CORR 2010»
15 years 24 days ago
Expansion and Search in Networks
Borrowing from concepts in expander graphs, we study the expansion properties of real-world, complex networks (e.g. social networks, unstructured peer-to-peer or P2P networks) and...
Arun S. Maiya, Tanya Y. Berger-Wolf