Sciweavers

1186 search results - page 140 / 238
» A New Approach to Secure Logging
Sort
View
ICADL
2003
Springer
149views Education» more  ICADL 2003»
15 years 6 months ago
Approximating Fair Use in LicenseScript
Current rights management systems are not able to enforce copyright laws because of both legal and technological reasons. The contract rights granted by a copyright owner are often...
Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel,...
120
Voted
SIGGRAPH
1994
ACM
15 years 4 months ago
A clustering algorithm for radiosity in complex environments
We present an approach for accelerating hierarchical radiosity by clustering objects. Previous approaches constructed effective hierarchies by subdividing surfaces, but could not ...
Brian E. Smits, James Arvo, Donald P. Greenberg
96
Voted
ICASSP
2010
IEEE
15 years 29 days ago
Fast signal analysis and decomposition on graphs using the Sparse Matrix Transform
Recently, the Sparse Matrix Transform (SMT) has been proposed as a tool for estimating the eigen-decomposition of high dimensional data vectors [1]. The SMT approach has two major...
Leonardo R. Bachega, Guangzhi Cao, Charles A. Boum...
115
Voted
IJHPCA
2006
117views more  IJHPCA 2006»
15 years 23 days ago
MPICH-V Project: A Multiprotocol Automatic Fault-Tolerant MPI
Abstract-- High performance computing platforms like Clusters, Grid and Desktop Grids are becoming larger and subject to more frequent failures. MPI is one of the most used message...
Aurelien Bouteiller, Thomas Hérault, G&eacu...
92
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Phase-sensitive speech enhancement for cochlear implant processing
In this paper, we present a new approach to enhance noisy speech based on an environmental model incorporating the phase between noise and clean speech (often called phasesensitiv...
Pourya S. Jafari, Hou-Yong Kang, Xiaosong Wang, Qi...