Sciweavers

4208 search results - page 666 / 842
» Challenges in Evaluating Distributed Algorithms
Sort
View
SIGGRAPH
1995
ACM
15 years 5 months ago
Applications of irradiance tensors to the simulation of non-Lambertian phenomena
We present new techniques for computing illumination from non-diffuse luminaires and scattering from non-diffuse surfaces. The methods are based on new closed-form expressions d...
James Arvo
CIA
2008
Springer
15 years 3 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
120
Voted
AMW
2010
15 years 3 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
CVPR
2010
IEEE
15 years 1 months ago
A probabilistic framework for joint segmentation and tracking
Most tracking algorithms implicitly apply a coarse segmentation of each target object using a simple mask such as a rectangle or an ellipse. Although convenient, such coarse segme...
Chad Aeschliman, Johnny Park, Avinash C. Kak
177
Voted
GLOBECOM
2008
IEEE
15 years 1 months ago
Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks
Network and service providers are rapidly deploying IPTV networks to deliver a wide variety of video content to subscribers. Some video content may be protected by copyright and/or...
Yali Liu, Canhui Ou, Zhi Li, Cherita L. Corbett, C...