Sciweavers

2391 search results - page 163 / 479
» From Nature to Methods and Back to Nature
Sort
View
109
Voted
IJVR
2007
72views more  IJVR 2007»
14 years 10 months ago
MACBETH: Management of Avatar Conflict by Employment of a Technique Hybrid
—When a virtual environment system prevents a user’s avatar hand from penetrating virtual objects, the seen and felt positions of the hand separate. We propose a new method for...
Eric Burns, Sharif Razzaque, Mary C. Whitton, Fred...
CVPR
2011
IEEE
14 years 5 months ago
Radiometric Calibration by Transform Invariant Low-rank Structure
We present a robust radiometric calibration method that capitalizes on the transform invariant low-rank structure of sensor irradiances recorded from a static scene with different...
Joon-Young Lee, Boxin Shi, Yasuyuki Matsushita, In...
POPL
2009
ACM
15 years 10 months ago
Bidirectionalization for free! (Pearl)
A bidirectional transformation consists of a function get that takes a source (document or value) to a view and a function put that takes an updated view and the original source b...
Janis Voigtländer
SPAA
2009
ACM
15 years 10 months ago
A lightweight in-place implementation for software thread-level speculation
Thread-level speculation (TLS) is a technique that allows parts of a sequential program to be executed in parallel. TLS ensures the parallel program's behaviour remains true ...
Cosmin E. Oancea, Alan Mycroft, Tim Harris
INFOCOM
2009
IEEE
15 years 4 months ago
Distributed Opportunistic Scheduling With Two-Level Channel Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...