Sciweavers

3096 search results - page 115 / 620
» Theory and Use of the EM Algorithm
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
A Theory of QoS for Wireless
—Wireless networks are increasingly used to carry applications with QoS constraints. Two problems arise when dealing with traffic with QoS constraints. One is admission control,...
I-Hong Hou, Vivek Borkar, P. R. Kumar
115
Voted
ECCV
2004
Springer
15 years 10 months ago
A Fourier Theory for Cast Shadows
—Cast shadows can be significant in many computer vision applications, such as lighting-insensitive recognition and surface reconstruction. Nevertheless, most algorithms neglect ...
Ravi Ramamoorthi, Melissa L. Koudelka, Peter N. Be...
ICWS
2008
IEEE
15 years 6 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
152
Voted
TVCG
2010
157views more  TVCG 2010»
15 years 2 months ago
Crease Surfaces: From Theory to Extraction and Application to Diffusion Tensor MRI
—Crease surfaces are two-dimensional manifolds along which a scalar field assumes a local maximum (ridge) or a local minimum (valley) in a constrained space. Unlike isosurfaces, ...
Thomas Schultz, Holger Theisel, Hans-Peter Seidel
ADVAI
2010
110views more  ADVAI 2010»
14 years 11 months ago
Using Genetic Algorithms to Represent Higher-Level Planning in Simulation Models of Conflict
The focus of warfare has shifted from the Industrial Age to the Information Age, as encapsulated by the term Network Enabled Capability. This emphasises information sharing, comma...
James Moffat, Susan Fellows