Sciweavers

384 search results - page 22 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
127
Voted
DEXAW
2010
IEEE
186views Database» more  DEXAW 2010»
15 years 14 days ago
Gaze-tracking and Acoustic Vector Sensors Technologies for PTZ Camera Steering and Acoustic Event Detection
—An innovative application of gaze-tracking and acoustic vector sensors (AVS) technologies for guidance of moving pan- tilt-zoom (PTZ) monitoring camera is presented. Gaze-tracki...
Jozef Kotus, Bartosz Kunka, Andrzej Czyzewski, Pio...
INFOCOM
2002
IEEE
15 years 6 months ago
Improving BGP Convergence Through Consistency Assertions
— This paper presents a new mechanism for improving the convergence properties of path vector routing algorithms, such as BGP. Using a route’s path information, we develop two ...
Dan Pei, Xiaoliang Zhao, Lan Wang, Daniel Massey, ...
VISUALIZATION
2003
IEEE
15 years 7 months ago
A Texture-Based Framework for Spacetime-Coherent Visualization of Time-Dependent Vector Fields
We propose Unsteady Flow Advection–Convolution (UFAC) as a novel visualization approach for unsteady flows. It performs time evolution governed by pathlines, but builds spatial...
Daniel Weiskopf, Gordon Erlebacher, Thomas Ertl
CAV
2010
Springer
154views Hardware» more  CAV 2010»
15 years 5 months ago
Verifying Low-Level Implementations of High-Level Datatypes
For efficiency and portability, network packet processing code is typically written in low-level languages and makes use of bit-level operations to compactly represent data. Althou...
Christopher L. Conway, Clark Barrett
JMIV
2006
124views more  JMIV 2006»
15 years 1 months ago
Segmentation of a Vector Field: Dominant Parameter and Shape Optimization
Vector field segmentation methods usually belong to either of three classes: methods which segment regions homogeneous in direction and/or norm, methods which detect discontinuiti...
Tristan Roy, Eric Debreuve, Michel Barlaud, Gilles...