Sciweavers

876 search results - page 99 / 176
» The next step - open prototyping
Sort
View
FGR
2008
IEEE
358views Biometrics» more  FGR 2008»
15 years 4 months ago
Automatic 3D face reconstruction from single images or video
This paper presents a fully automated algorithm for reconstructing a textured 3D model of a face from a single photograph or a raw video stream. The algorithm is based on a combin...
Pia Breuer, Kwang In Kim, Wolf Kienzle, Bernhard S...
GLOBECOM
2008
IEEE
15 years 4 months ago
Performance Study of the NSIS QoS-NSLP Protocol
—This paper presents an evaluation of the Quality of Service Signalling Layer Protocol (QoS-NSLP) of the NSIS (Next Steps In Signalling) protocol suite. The QoS-NSLP in combinati...
Mayutan Arumaithurai, Xiaoming Fu, Bernd Schloer, ...
ICNS
2008
IEEE
15 years 4 months ago
Traffic Distribution Forecasting in Packet-Switching Networks
: Traffic distribution forecasting is an essential step in network planning for packet-switching networks. It is frequently necessary to forecast and develop an optimal network con...
Faramak Zandi
KBSE
2008
IEEE
15 years 4 months ago
Test-Suite Augmentation for Evolving Software
One activity performed by developers during regression testing is test-suite augmentation, which consists of assessing the adequacy of a test suite after a program is modified an...
Raúl A. Santelices, Pavan Kumar Chittimalli...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...