Sciweavers

279 search results - page 42 / 56
» The Voltan application programming environment for fail-sile...
Sort
View
ICMCS
2006
IEEE
243views Multimedia» more  ICMCS 2006»
15 years 5 months ago
A Comparison of Three 3-D Facial Reconstruction Approaches
We compare three Computer Vision approaches to 3-D reconstruction, namely passive Binocular Stereo and active Structured Lighting and Photometric Stereo, in application to human f...
Alexander Woodward, Da An, Georgy L. Gimel'farb, P...
HICSS
1996
IEEE
139views Biometrics» more  HICSS 1996»
15 years 4 months ago
Strictly Class-Based Modeling Considered Harmful
Many object-oriented methods have assumed classbased approaches, without considering prototype-based ones. Some authors, while admitting prototypes as a useful concept, only envis...
Birgitte Krogh, Sean Levy, Allen H. Dutoit, Eswara...
ECBS
2004
IEEE
153views Hardware» more  ECBS 2004»
15 years 3 months ago
Architectural Description with Integrated Data Consistency Models
The focus of typical architectural models is the description of large systems. Even though these systems are usually distributed, aspects of distributed systems are only addressed...
Peter Tabeling
ISN
2000
Springer
127views Communications» more  ISN 2000»
15 years 3 months ago
Supporting Advanced Multimedia Telecommunications Services Using the Distributed Component Object Model
The demand for a great variety of sophisticated telecommunications services with multimedia characteristics is increasing. This trend highlights the need for the efficient creation...
Dionisis X. Adamopoulos, George Pavlou, Constantin...
DBSEC
1996
125views Database» more  DBSEC 1996»
15 years 1 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi