Sciweavers

1569 search results - page 127 / 314
» Constrained Navigation Environments
Sort
View
160
Voted
SIGGRAPH
1994
ACM
15 years 9 months ago
A clustering algorithm for radiosity in complex environments
We present an approach for accelerating hierarchical radiosity by clustering objects. Previous approaches constructed effective hierarchies by subdividing surfaces, but could not ...
Brian E. Smits, James Arvo, Donald P. Greenberg
ICC
2007
IEEE
179views Communications» more  ICC 2007»
15 years 11 months ago
An Improved Vehicular Ad Hoc Routing Protocol for City Environments
—The fundamental component for the success of VANET (Vehicular Ad hoc NETworks) applications is routing since it must efficiently handle rapid topology changes and a fragmented n...
Moez Jerbi, Sidi-Mohammed Senouci, Rabah Meraihi, ...
IPPS
1999
IEEE
15 years 9 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
EUROPAR
2008
Springer
15 years 6 months ago
Transparent Mobile Middleware Integration for Java and .NET Development Environments
Developing a distributed application for mobile resource constrained devices is a difficult and error-prone task that requires awareness of several system-level details (e.g., faul...
Edgar Marques, Luís Veiga, Paulo Ferreira
ICISC
2007
134views Cryptology» more  ICISC 2007»
15 years 6 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim