Sciweavers

12050 search results - page 2208 / 2410
» Modeling and Simulation
Sort
View
JVCA
2006
87views more  JVCA 2006»
15 years 3 months ago
Tour into the picture with water surface reflection and object movements
Given a still picture, tour into the picture (TIP) generates a walk-through animation of a 3D scene constructed from the picture. In this paper, we generalize TIP to deal with wat...
Jinho Park, Nambin Heo, Sunghee Choi, Sung Yong Sh...
LISP
2006
105views more  LISP 2006»
15 years 3 months ago
Call-by-push-value: Decomposing call-by-value and call-by-name
We present the call-by-push-value (CBPV) calculus, which decomposes the typed call-by-value (CBV) and typed call-by-name (CBN) paradigms into fine-grain primitives. On the operatio...
Paul Blain Levy
MP
2006
107views more  MP 2006»
15 years 3 months ago
Convergence theory for nonconvex stochastic programming with an application to mixed logit
Monte Carlo methods have been used extensively in the area of stochastic programming. As with other methods that involve a level of uncertainty, theoretical properties are required...
Fabian Bastin, Cinzia Cirillo, Philippe L. Toint
IAJIT
2007
150views more  IAJIT 2007»
15 years 3 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
PERCOM
2008
ACM
15 years 3 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
« Prev « First page 2208 / 2410 Last » Next »