Sciweavers

5544 search results - page 868 / 1109
» Three Inadequate Models
Sort
View
EUROCRYPT
1999
Springer
15 years 8 months ago
An Analysis of Exponentiation Based on Formal Languages
A recoding rule for exponentiation is a method for reducing the cost of the exponentiation ae by reducing the number of required multiplications. If w(e) is the (hamming) weight of...
Luke O'Connor
RTCSA
1999
IEEE
15 years 8 months ago
Bandwidth Reservation for Real Time Traffic in Wireless Mobile Environment
This study proposes a new bandwidth reservation strategy (Two Level Guarantee) in wireless environment based on the user mobility specification which is assumed to be given at cal...
Byung-Kyu Choi, Riccardo Bettati
VISUALIZATION
1999
IEEE
15 years 8 months ago
Spiraling Edge: Fast Surface Reconstruction from Partially Organized Sample Points
Many applications produce three-dimensional points that must be further processed to generate a surface. Surface reconstruction algorithms that start with a set of unorganized poi...
Patricia Crossno, Edward Angel
159
Voted
CODES
1998
IEEE
15 years 8 months ago
The construction of a retargetable simulator for an architecture template
Systems in the domain of high-performance video signal processing are becoming more and more programmable. We suggest an approach to design such systems that involves measuring, v...
Bart Kienhuis, Ed F. Deprettere, Kees A. Vissers, ...
146
Voted
FGR
1998
IEEE
203views Biometrics» more  FGR 1998»
15 years 8 months ago
Automated Facial Expression Recognition Based on FACS Action Units
Automated recognition of facial expression is an important addition to computer vision research because of its relevance to the study of psychological phenomena and the developmen...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...