Sciweavers

5948 search results - page 932 / 1190
» Computing Robust Counter-Strategies
Sort
View
SAC
2003
ACM
15 years 9 months ago
Image Retrieval With Embedded Region Relationships
Image retrieval based on content from digital libraries, multimedia databases, the Internet, and other sources has been an important problem addressed by several researchers. In t...
Sharat Chandran, Naga Kiran
SLIP
2003
ACM
15 years 9 months ago
Error-correction and crosstalk avoidance in DSM busses
Aggressive process scaling and increasing clock rates have made crosstalk noise an important issue in VLSI design. Switching on adjacent wires on long bus lines can increase delay...
Ketan N. Patel, Igor L. Markov
SMA
2003
ACM
191views Solid Modeling» more  SMA 2003»
15 years 9 months ago
Free-form skeleton-driven mesh deformations
In this paper, we propose a new scheme for free-form skeletondriven global mesh deformations. First a Voronoi-based skeletal mesh is extracted from a given original mesh. Next the...
Shin Yoshizawa, Alexander G. Belyaev, Hans-Peter S...
FC
2003
Springer
101views Cryptology» more  FC 2003»
15 years 9 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
133
Voted
HUC
2003
Springer
15 years 9 months ago
RightSPOT: A Novel Sense of Location for a Smart Personal Object
Abstract. One of the main prerequisites for location-based services is knowledge of location. We present a simple algorithm for computing the location of a device based on signal s...
John Krumm, Gerry Cermak, Eric Horvitz