Sciweavers

24529 search results - page 4534 / 4906
» Computing on Authenticated Data
Sort
View
CERA
2004
89views more  CERA 2004»
15 years 4 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
CGF
2004
113views more  CGF 2004»
15 years 4 months ago
Coherent Hierarchical Culling: Hardware Occlusion Queries Made Useful
We present a simple but powerful algorithm for optimizing the usage of hardware occlusion queries in arbitrary complex scenes. Our method minimizes the number of issued queries an...
Jirí Bittner, Michael Wimmer, Harald Piring...
CORR
2004
Springer
142views Education» more  CORR 2004»
15 years 4 months ago
Modeling and Validating Hybrid Systems Using VDM and Mathematica
Hybrid systems are characterized by the hybrid evolution of their state: A part of the state changes discretely, the other part changes continuously over time. Typically, modern c...
Bernhard K. Aichernig, Reinhold Kainhofer
ADAC
2008
193views more  ADAC 2008»
15 years 5 months ago
A constrained-optimization based half-quadratic algorithm for robustly fitting sets of linearly parametrized curves
We consider the problem of multiple fitting of linearly parametrized curves, that arises in many computer vision problems such as road scene analysis. Data extracted from images us...
Jean-Philippe Tarel, Sio-Song Ieng, Pierre Charbon...
AROBOTS
2000
104views more  AROBOTS 2000»
15 years 4 months ago
Heterogeneous Teams of Modular Robots for Mapping and Exploration
In this article, we present the design of a team of heterogeneous, centimeter-scale robots that collaborate to map and explore unknown environments. The robots, called Millibots, a...
Robert Grabowski, Luis E. Navarro-Serment, Christi...
« Prev « First page 4534 / 4906 Last » Next »