Sciweavers

6202 search results - page 191 / 1241
» Without Loss of Generality
Sort
View
IJVR
2007
72views more  IJVR 2007»
15 years 5 months ago
MACBETH: Management of Avatar Conflict by Employment of a Technique Hybrid
—When a virtual environment system prevents a user’s avatar hand from penetrating virtual objects, the seen and felt positions of the hand separate. We propose a new method for...
Eric Burns, Sharif Razzaque, Mary C. Whitton, Fred...
TC
2008
15 years 5 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...
TCSV
2008
141views more  TCSV 2008»
15 years 5 months ago
Enhanced MC-EZBC Scalable Video Coder
In this paper, we provide some recent extensions to the scalable subband/wavelet video coder MC-EZBC. The enhanced MC-EZBC employs an adaptive motion-compensated temporal filter (M...
Yongjun Wu, Konstantin Hanke, Thomas Rusert, John ...
TSP
2008
134views more  TSP 2008»
15 years 5 months ago
Computational Algorithms for Wavelet Identification of Nonlinearities in Hammerstein Systems With Random Inputs
Abstract-- Simple and efficient computational algorithms for nonparametric wavelet-based identification of nonlinearities in Hammerstein systems driven by random signals are propos...
Przemyslaw Sliwinski, Zygmunt Hasiewicz
COMCOM
2002
139views more  COMCOM 2002»
15 years 5 months ago
Improving TCP handoff performance in Mobile IP based networks
Mobile IP has been designed to support host mobility over the Internet. In this paper, we show that in most cases the smooth handoff by the route optimization of the Mobile IP sta...
Doo Seop Eom, HeyungSub Lee, Masashi Sugano, Masay...