Sciweavers

43264 search results - page 8479 / 8653
» Comparing models of computation
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 2 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
77
Voted
EMMCVPR
2007
Springer
15 years 2 months ago
An Automatic Portrait System Based on And-Or Graph Representation
Abstract. In this paper, we present an automatic human portrait system based on the And-Or graph representation. The system can automatically generate a set of life-like portraits ...
Feng Min, Jin-Li Suo, Song Chun Zhu, Nong Sang
90
Voted
COMPGEOM
2010
ACM
15 years 2 months ago
Manifold reconstruction using tangential Delaunay complexes
We give a provably correct algorithm to reconstruct a kdimensional manifold embedded in d-dimensional Euclidean space. Input to our algorithm is a point sample coming from an unkn...
Jean-Daniel Boissonnat, Arijit Ghosh
DAC
2010
ACM
15 years 2 months ago
TSV stress aware timing analysis with applications to 3D-IC layout optimization
As the geometry shrinking faces severe limitations, 3D wafer stacking with through silicon via (TSV) has gained interest for future SOC integration. Since TSV fill material and s...
Jae-Seok Yang, Krit Athikulwongse, Young-Joon Lee,...
128
Voted
ESA
2007
Springer
153views Algorithms» more  ESA 2007»
15 years 2 months ago
Tradeoffs and Average-Case Equilibria in Selfish Routing
We consider the price of selfish routing in terms of tradeoffs and from an average-case perspective. Each player in a network game seeks to send a message with a certain length by...
Martin Hoefer, Alexander Souza
« Prev « First page 8479 / 8653 Last » Next »