Sciweavers

449 search results - page 56 / 90
» Tracking through changes in scale
Sort
View
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
15 years 6 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
ISMAR
2003
IEEE
15 years 5 months ago
A real-time tracker for markerless augmented reality
Augmented Reality has now progressed to the point where real-time applications are being considered and needed. At the same time it is important that synthetic elements are render...
Andrew I. Comport, Éric Marchand, Fran&cced...
ASPLOS
2010
ACM
15 years 6 months ago
CoreDet: a compiler and runtime system for deterministic multithreaded execution
The behavior of a multithreaded program does not depend only on its inputs. Scheduling, memory reordering, timing, and low-level hardware effects all introduce nondeterminism in t...
Tom Bergan, Owen Anderson, Joseph Devietti, Luis C...
ISBI
2007
IEEE
15 years 6 months ago
Sub-Resolution Maximum-Likelihood Based Localization of Fluorescent Nanoparticles in Three Dimensions
Several recent studies have shown that fluorescent particles can be localized with an accuracy that is well beyond traditional resolution limits. Using a theoretical model of the...
François Aguet, Dimitri Van De Ville, Micha...
INFOCOM
2005
IEEE
15 years 5 months ago
SyncScan: practical fast handoff for 802.11 infrastructure networks
Abstract— Wireless access networks scale by replicating base stations geographically and then allowing mobile clients to seamlessly “hand off” from one station to the next as...
Ishwar Ramani, Stefan Savage