Sciweavers

102291 search results - page 20224 / 20459
» Computing
Sort
View
136
Voted
JCP
2007
121views more  JCP 2007»
15 years 19 days ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
109
Voted
TOCS
2008
131views more  TOCS 2008»
15 years 19 days ago
A generic component model for building systems software
Component-based software structuring principles are now commonly and successfully applied at the application level; but componentisation is far less established when it comes to b...
Geoff Coulson, Gordon S. Blair, Paul Grace, Fran&c...
124
Voted
TOG
2008
293views more  TOG 2008»
15 years 19 days ago
A perceptually validated model for surface depth hallucination
Capturing detailed surface geometry currently requires specialized equipment such as laser range scanners, which despite their high accuracy, leave gaps in the surfaces that must ...
Mashhuda Glencross, Gregory J. Ward, Francho Melen...
88
Voted
TOG
2008
180views more  TOG 2008»
15 years 19 days ago
Diffusion curves: a vector representation for smooth-shaded images
We describe a new vector-based primitive for creating smoothshaded images, called the diffusion curve. A diffusion curve partitions the space through which it is drawn, defining d...
Alexandrina Orzan, Adrien Bousseau, Holger Winnem&...
103
Voted
CCR
2005
97views more  CCR 2005»
15 years 19 days ago
On the robustness of router-based denial-of-service (DoS) defense systems
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
Ying Xu, Roch Guérin
« Prev « First page 20224 / 20459 Last » Next »