We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...
Interactive Internet Applications that rely on sequential streams for lossless data exchange often use retransmission protocols (e.g. TCP) for reliability and the guarantee of seq...
This paper evaluates several techniques to save leakage in CMP L2 caches by selectively switching off the less used lines. We primarily focus on private snoopy L2 caches. In this c...
Matteo Monchiero, Ramon Canal, Antonio Gonzá...
For haptic devices, compensation of the robot's gravity is a frequent strategy with the aim to reduce interaction forces between robot and human in zero-impedance control. How...
Heike Vallery, Alexander Duschau-Wicke, Robert Rie...
Although RANSAC is the most widely used robust estimator in computer vision, it has certain limitations making it ineffective in some situations, such as the motion estimation prob...
Trung Ngo Thanh, Hajime Nagahara, Ryusuke Sagawa, ...