Sciweavers

1689 search results - page 288 / 338
» Proximate point searching
Sort
View
CGF
2007
145views more  CGF 2007»
14 years 9 months ago
Bitmask Soft Shadows
Recently, several real-time soft shadow algorithms have been introduced which all compute a single shadow map and use its texels to obtain a discrete scene representation. The res...
Michael Schwarz, Marc Stamminger
IVS
2006
127views more  IVS 2006»
14 years 9 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
JUCS
2008
155views more  JUCS 2008»
14 years 9 months ago
Dynamic Bandwidth Pricing: Provision Cost, Market Size, Effective Bandwidths and Price Games
Abstract: Nowadays, in the markets of broadband access services, traditional contracts are of "static" type. Customers buy the right to use a specific amount of resources...
Sergios Soursos, Costas Courcoubetis, Richard R. W...
JNW
2006
120views more  JNW 2006»
14 years 9 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
PAMI
2008
174views more  PAMI 2008»
14 years 9 months ago
Multiflash Stereopsis: Depth-Edge-Preserving Stereo with Small Baseline Illumination
Traditional stereo matching algorithms are limited in their ability to produce accurate results near depth discontinuities, due to partial occlusions and violation of smoothness co...
Rogerio Feris, Ramesh Raskar, Longbin Chen, Kar-Ha...