Sciweavers

9210 search results - page 1497 / 1842
» Analyzing Real-Time Systems
Sort
View
MM
2009
ACM
177views Multimedia» more  MM 2009»
15 years 11 months ago
Perceptual quality assessment based on visual attention analysis
Most existing quality metrics do not take the human attention analysis into account. Attention to particular objects or regions is an important attribute of human vision and perce...
Junyong You, Andrew Perkis, Miska M. Hannuksela, M...
SIGCOMM
2009
ACM
15 years 11 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
129
Voted
SIGCOMM
2009
ACM
15 years 11 months ago
PathForge: faithful anonymization of movement data
For most mobile networks, providers need the current position of their users to provide efficient service. The resulting motion data is not only an invaluable source for analyzing...
Sebastian Kay Belle, Marcel Waldvogel, Oliver Haas...
SLIP
2009
ACM
15 years 11 months ago
From 3D circuit technologies and data structures to interconnect prediction
New technologies such as 3D integration are becoming a new force that is keeping Moore’s law in effect in today’s nano era. By adding a third dimension in current 2D circuits...
Robert Fischbach, Jens Lienig, Tilo Meister
SMA
2009
ACM
134views Solid Modeling» more  SMA 2009»
15 years 11 months ago
Exact Delaunay graph of smooth convex pseudo-circles: general predicates, and implementation for ellipses
We examine the problem of computing exactly the Delaunay graph (and the dual Voronoi diagram) of a set of, possibly intersecting, smooth convex pseudo-circles in the Euclidean pla...
Ioannis Z. Emiris, Elias P. Tsigaridas, George M. ...
« Prev « First page 1497 / 1842 Last » Next »