Sciweavers

792 search results - page 112 / 159
» Constrained Ramsey Numbers
Sort
View
CSFW
2000
IEEE
15 years 1 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
SMA
1995
ACM
217views Solid Modeling» more  SMA 1995»
15 years 1 months ago
Bubble mesh: automated triangular meshing of non-manifold geometry by sphere packing
This paper presents a new computational method for fully automated triangular mesh generation, consistently applicable to wire-frame, surface, solid, and nonmanifold geometries. T...
Kenji Shimada, David C. Gossard
113
Voted
SCA
2007
15 years 9 days ago
Smooth movers: perceptually guided human motion simulation
To animate a character, a number of poses are displayed in quick succession in order to create the illusion of motion. For most real-time applications, such as games, the pose upd...
Rachel McDonnell, Fiona N. Newell, Carol O'Sulliva...
ICPR
2010
IEEE
14 years 12 months ago
Fusion of Qualities for Frame Selection in Video Face Verification
It is known that the use of video can help improve the performance of face verification systems. However, processing video in resource constrained devices is prohibitive. In order ...
Mauricio Villegas, Roberto Paredes
CASES
2008
ACM
14 years 12 months ago
Execution context optimization for disk energy
Power, energy, and thermal concerns have constrained embedded systems designs. Computing capability and storage density have increased dramatically, enabling the emergence of hand...
Jerry Hom, Ulrich Kremer