Sciweavers

7978 search results - page 1365 / 1596
» Combining shared-coin algorithms
Sort
View
CORR
2008
Springer
108views Education» more  CORR 2008»
15 years 4 months ago
Polyomino-Based Digital Halftoning
In this work, we present a new method for generating a threshold structure. This kind of structure can be advantageously used in various halftoning algorithms such as clustered-do...
David Vanderhaeghe, Victor Ostromoukhov
98
Voted
CSI
2008
95views more  CSI 2008»
15 years 4 months ago
Feasibility and infrastructural study of AR interfacing and intuitive simulation on 3D nonlinear systems
High-fidelity simulations with intuitive user interfaces expedite real-world tasks. Augmented Reality (AR), enables 3D computer-generated entities to coexist in users' view o...
Seungjun Kim, Nitaigour-Premchand Mahalik, Anind K...
EC
2010
133views ECommerce» more  EC 2010»
15 years 4 months ago
Interactive EC Control of Synthesized Timbre
Perhaps the biggest limitation of interactive EC is the fitness evaluation bottleneck, caused by slow user evaluation and leading to small populations and user fatigue. In this st...
James McDermott, Michael O'Neill, Niall J. L. Grif...
DC
2008
15 years 4 months ago
Sketching asynchronous data streams over sliding windows
We study the problem of maintaining a sketch of recent elements of a data stream. Motivated by applications involving network data, we consider streams that are asynchronous, in wh...
Bojian Xu, Srikanta Tirthapura, Costas Busch
ENTCS
2008
87views more  ENTCS 2008»
15 years 4 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
« Prev « First page 1365 / 1596 Last » Next »