Sciweavers

2714 search results - page 332 / 543
» Approximation Schemes for Scheduling
Sort
View
ICIP
2007
IEEE
15 years 10 months ago
Packet Loss Resilient Transmission of 3D Models
This paper presents an efficient joint source-channel coding scheme based on forward error correction (FEC) for three dimensional (3D) models. The system employs a wavelet based ...
M. Oguz Bici, Andrey Norkin, Gozde Bozdagi Akar
FC
2005
Springer
97views Cryptology» more  FC 2005»
15 years 9 months ago
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
Abstract. We propose a scheme for privacy-preserving escrow of financial transactions. The objective of the scheme is to preserve privacy and anonymity of the individual user enga...
Stanislaw Jarecki, Vitaly Shmatikov
SCALESPACE
2005
Springer
15 years 9 months ago
Discontinuity-Preserving Computation of Variational Optic Flow in Real-Time
Variational methods are very popular for optic flow computation: They yield dense flow fields and perform well if they are adapted such that they respect discontinuities in the ...
Andrés Bruhn, Joachim Weickert, Timo Kohlbe...
ACSC
2003
IEEE
15 years 9 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
133
Voted
ICS
1997
Tsinghua U.
15 years 8 months ago
Eliminating Cache Conflict Misses through XOR-Based Placement Functions
This paper makes the case for the use of XOR-based placement functions for cache memories. It shows that these XOR-mapping schemes can eliminate many conflict misses for direct-ma...
Antonio González, Mateo Valero, Nigel P. To...