Sciweavers

2863 search results - page 407 / 573
» Constructing minimum-interference networks
Sort
View
145
Voted
EUROCRYPT
2007
Springer
15 years 9 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
166
Voted
ISMAR
2006
IEEE
15 years 9 months ago
Implementation of god-like interaction techniques for supporting collaboration between outdoor AR and indoor tabletop users
This paper presents a new interaction metaphor we have termed “god-like interaction”. This is a metaphor for improved communication of situational and navigational information...
Aaron Stafford, Wayne Piekarski, Bruce H. Thomas
CODES
2005
IEEE
15 years 9 months ago
SOMA: a tool for synthesizing and optimizing memory accesses in ASICs
Arbitrary memory dependencies and variable latency memory systems are major obstacles to the synthesis of large-scale ASIC systems in high-level synthesis. This paper presents SOM...
Girish Venkataramani, Tiberiu Chelcea, Seth Copen ...
150
Voted
SIGGRAPH
1996
ACM
15 years 7 months ago
Automatic Reconstruction of B-Spline Surfaces of Arbitrary Topological Type
Creating freeform surfaces is a challenging task even with advanced geometric modeling systems. Laser range scanners offer a promising alternative for model acquisition--the 3D sc...
Matthias Eck, Hugues Hoppe
WSC
1998
15 years 4 months ago
The Use of Simulation in the Planning of the Dutch Railway Services
The design of a quality timetable for the Dutch Railways is a complex task, because of the characteristics of the railway services. The complexity of the network and the heavily i...
Jurjen S. Hooghiemstra, Maurice J. G. Tunisse