Sciweavers

4744 search results - page 223 / 949
» Connected Computing
Sort
View
109
Voted
ACSC
2007
IEEE
15 years 10 months ago
From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions
In this paper we propose an algorithm for automatic transformation of a graph into a 3D Virtual World and its Euclidean map, using the rectangular dualization technique. The nodes...
Sara Drago, Anton Bogdanovych, Massimo Ancona, Sim...
ICIP
2007
IEEE
15 years 10 months ago
Skeletonization using SSM of the Distance Transform
This paper proposes a new approach for skeletonization based on the skeleton strength map (SSM) caculated by Euclidean distance transform of a binary image. After the distance tra...
Longin Jan Latecki, Quannan Li, Xiang Bai, Wenyu L...
107
Voted
GG
2004
Springer
15 years 9 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
120
Voted
OPNETEC
2004
Springer
15 years 9 months ago
Routing and Wavelength Assignment for Scheduled and Random Lightpath Demands: Bifurcated Routing versus Non-Bifurcated Routing
: We consider the routing and the wavelength assignment (RWA) of scheduled and random lightpath demands in a wavelength switching mesh network without wavelength conversion functio...
Mohamed Koubàa, Nicolas Puech, Maurice Gagn...
120
Voted
DSN
2003
IEEE
15 years 9 months ago
Reliable Communication in Overlay Networks
Abstract— Reliable point-to-point communication is usually achieved in overlay networks by applying TCP/IP on the end nodes of a connection. This paper presents an hopby-hop reli...
Yair Amir, Claudiu Danilov