Sciweavers

809 search results - page 144 / 162
» 04421 Abstracts Collection - Algebraic Methods in Computatio...
Sort
View
EUROPAR
2004
Springer
15 years 1 months ago
Imprecise Exceptions in Distributed Parallel Components
Abstract. Modern microprocessors have sacrificed the exactness of exceptions for improved performance long ago. This is a side effect of reordering instructions so that the micropr...
Kostadin Damevski, Steven G. Parker
ADHOCNOW
2008
Springer
14 years 10 months ago
Adaptive Priority Based Distributed Dynamic Channel Assignment for Multi-radio Wireless Mesh Networks
Abstract. This paper investigates the challenges involve in designing a dynamic channel assignment (DCA) scheme for wireless mesh networks, particularly for multi-radio systems. It...
Tope R. Kareem, Karel Matthee, H. Anthony Chan, Nt...
MICCAI
2004
Springer
15 years 10 months ago
Enhancement of Visual Realism with BRDF for Patient Specific Bronchoscopy Simulation
Abstract. This paper presents a novel method for photorealistic rendering of the bronchial lumen by directly deriving matched shading and texture parameters from video bronchoscope...
Adrian James Chung, Fani Deligianni, Pallav Shah, ...
ECCV
2008
Springer
15 years 11 months ago
Unsupervised Structure Learning: Hierarchical Recursive Composition, Suspicious Coincidence and Competitive Exclusion
Abstract. We describe a new method for unsupervised structure learning of a hierarchical compositional model (HCM) for deformable objects. The learning is unsupervised in the sense...
Long Zhu, Chenxi Lin, Haoda Huang, Yuanhao Chen, A...
87
Voted
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
15 years 10 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra