• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,328
Next 10 →

VIDEO CODING BASED ON SEAMLESS COMBINATION OF MOTION COMPENSATION AND MATCHING PURSUITS

by Ichiro Matsuda, Susumu Itoh
"... This paper proposes a low bit-rate video coding scheme based on combination of motion compensation and waveform coding. In order to realize appropriate bit-allocation to both motion compensation and waveform coding according to the structural properties of video signals, we employ matching pursuits ..."
Abstract - Add to MetaCart
This paper proposes a low bit-rate video coding scheme based on combination of motion compensation and waveform coding. In order to realize appropriate bit-allocation to both motion compensation and waveform coding according to the structural properties of video signals, we employ matching pursuits

A volumetric method for building complex models from range images,”

by Brian Curless , Marc Levoy - in Proceedings of the 23rd annual conference on Computer graphics and interactive techniques. ACM, , 1996
"... Abstract A number of techniques have been developed for reconstructing surfaces by integrating groups of aligned range images. A desirable set of properties for such algorithms includes: incremental updating, representation of directional uncertainty, the ability to fill gaps in the reconstruction, ..."
Abstract - Cited by 1020 (17 self) - Add to MetaCart
with one range image at a time, we first scan-convert it to a distance function, then combine this with the data already acquired using a simple additive scheme. To achieve space efficiency, we employ a run-length encoding of the volume. To achieve time efficiency, we resample the range image to align

A Hybrid Testbed for a Seamless Combination of Wireless Sensor Networks and OMNeT++ Simulations

by Stefan Unterschütz, Volker Turau
"... Abstract—Protocol development for large-scale wireless networks is challenging due to the inherently unreliable nature and massive distribution of such systems. Specially the transition from simulation to a real testbed deployment and later from testbed to large-scale deployments is frequently accom ..."
Abstract - Add to MetaCart
accompanied by many software and hardware errors. In this paper a hybrid testbed approach is introduced which seamlessly combines real 802.15.4 deployments with real-time simulations based on OMNeT++. The integration of a simulation tool in a testbed bears good prospects and reduces costs since extensive

Seamless Combination of Shared and Personalized Information Presentation to Groups of Visitors in Active Museums – Research Agenda

by Jörg Baus A, Antonio Krüger B, Tsvi Kuflik C
"... The goal of the proposed research is to enhance group experiences in a museum by: (1) intelligent distribution of information across several devices, allowing members of a group to follow a public presentation while their personal interests are addressed through individual annotations on a private d ..."
Abstract - Add to MetaCart
The goal of the proposed research is to enhance group experiences in a museum by: (1) intelligent distribution of information across several devices, allowing members of a group to follow a public presentation while their personal interests are addressed through individual annotations on a private device, and (2) navigation support of the whole group, by finding a route through the museum that maximizes the interests of all group members and helps to mutually explore and uncover most of the relevant topics related to a cultural heritage site. 1

Transactional Locking II

by Dave Dice, Ori Shalev, Nir Shavit - In Proc. of the 20th Intl. Symp. on Distributed Computing , 2006
"... Abstract. The transactional memory programming paradigm is gaining momentum as the approach of choice for replacing locks in concurrent programming. This paper introduces the transactional locking II (TL2) algorithm, a software transactional memory (STM) algorithm based on a combination of commit-ti ..."
Abstract - Cited by 359 (17 self) - Add to MetaCart
Abstract. The transactional memory programming paradigm is gaining momentum as the approach of choice for replacing locks in concurrent programming. This paper introduces the transactional locking II (TL2) algorithm, a software transactional memory (STM) algorithm based on a combination of commit

Towards seamless computing and metacomputing in Java

by Denis Caromel, Wilfried Klauser, Julien Vayssière - CONCURRENCY: PRACT. EXPER.,VOL.10(11–13), 1043–1061 (1998) , 1998
"... Due to its platform-independent execution model, its support for networking, multithreading and mobile code, Java has given hope that easy Internet-wide high-performance network computing was at hand. Numerous attempts have then been made at providing a framework for the development of such metacomp ..."
Abstract - Cited by 136 (18 self) - Add to MetaCart
of such metacomputing applications. Unfortunately, none of them addresses seamless sequential, multithreaded and distributed computing, i.e. the execution of the same application on a multiprocessor shared-memory machine as well as on a network of workstations, or on any hierarchical combination of both. In this paper

Seamless image stitching in the gradient domain

by Anat Levin, Assaf Zomet, Shmuel Peleg, Yair Weiss - In Proceedings of the European Conference on Computer Vision , 2006
"... Abstract. Image stitching is used to combine several individual images having some overlap into a composite image. The quality of image stitching is measured by the similarity of the stitched image to each of the input images, and by the visibility of the seam between the stitched images. In order t ..."
Abstract - Cited by 114 (1 self) - Add to MetaCart
Abstract. Image stitching is used to combine several individual images having some overlap into a composite image. The quality of image stitching is measured by the similarity of the stitched image to each of the input images, and by the visibility of the seam between the stitched images. In order

Interactive Digital Photomontage

by Aseem Agarwala, Mira Dontcheva, Maneesh Agrawala, Steven Drucker, Alex Colburn, Brian Curless, David Salesin, Michael Cohen - ACM TRANS. GRAPH , 2004
"... We describe an interactive, computer-assisted framework for combining parts of a set of photographs into a single composite picture, a process we call "digital photomontage." Our framework makes use of two techniques primarily: graph-cut optimization, to choose good seams within the consti ..."
Abstract - Cited by 304 (17 self) - Add to MetaCart
the constituent images so that they can be combined as seamlessly as possible; and gradient-domain fusion, a process based on Poisson equations, to further reduce any remaining visible artifacts in the composite. Also central to the framework is a suite of interactive tools that allow the user to specify a

Bridging Physical and Virtual Worlds with Electronic Tags

by Roy Want, Kenneth P. Fishkin, Anuj Gujar, Beverly L. Harrison , 1999
"... The role of computers in the modern office has tended to split our activities between virtual interactions in the realm of the computer and physical interactions with real objects that have been part of the traditional office infrastructure. This paper discusses a variety of scenarios we have implem ..."
Abstract - Cited by 281 (7 self) - Add to MetaCart
implemented in which the physical world can be invisibly and seamlessly augmented with electronic tags in order to connect physical objects with virtual representations or computational functionality. We demonstrate the utility of linking physical objects to electronic services and actions that are naturally

A Seamless Application Framework

by Hao-hua Chu, Henry Song, Y Wong, Shoji Kurakake, Masaji Katagiri - Journal of System and Software , 2004
"... One of the biggest challenges in future application development is device heterogeneity. In the future, we expect to see a rich variety of computing devices that can run applications. These devices have different capabilities in processors, memory, networking, screen sizes, input methods, and softwa ..."
Abstract - Cited by 26 (1 self) - Add to MetaCart
, and software libraries. We also expect that future users are likely to own many types of devices. Depending on users ’ changing situations and environments, they may choose to switch from one type of device to another that brings the best combination of application functionality and device mobility (size
Next 10 →
Results 1 - 10 of 1,328
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University