Sciweavers

5948 search results - page 949 / 1190
» Computing Robust Counter-Strategies
Sort
View
IWAN
2000
Springer
15 years 7 months ago
Active Concealment for Internet Speech Transmission
Recently, active networks have been highlighted as a key enabling technology to obtain immense flexibility in terms of network deployment, configurability, and packet processing. E...
Long Le, Henning Sanneck, Georg Carle, Tohru Hoshi
123
Voted
PPSN
2000
Springer
15 years 7 months ago
A Hybrid GA for the Edge-Biconnectivity Augmentation Problem
In the design of communication networks, robustness against failures in single links or nodes is an important issue. This paper proposes a new approach for the NP-complete edge-bic...
Ivana Ljubic, Günther R. Raidl, Jozef Kratica
149
Voted
ACCV
1995
Springer
15 years 7 months ago
Developing an Active Observer
We present a binocular active vision system that can attend to and xate a moving target. Our system has an open and expandable design and it forms the rst steps of a long term e o...
Jan-Olof Eklundh, Tomas Uhlin, Peter Nordlund, Ats...
SIGGRAPH
2000
ACM
15 years 7 months ago
Out-of-core simplification of large polygonal models
We present an algorithm for out-of-core simplification of large polygonal datasets that are too complex to fit in main memory. The algorithm extends the vertex clustering scheme o...
Peter Lindstrom
EUROCRYPT
1997
Springer
15 years 7 months ago
A Secure and Optimally Efficient Multi-Authority Election Scheme
In this paper we present a new multi-authority secret-ballot election scheme that guarantees privacy, universal verifiability, and robustness. It is the first scheme for which the ...
Ronald Cramer, Rosario Gennaro, Berry Schoenmakers