Sciweavers

7623 search results - page 198 / 1525
» Constructive Volume Modeling
Sort
View
125
Voted
ACISP
2006
Springer
15 years 7 months ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt
109
Voted
SPAA
1998
ACM
15 years 8 months ago
Computation-Centric Memory Models
We present a computation-centric theory of memory models. Unlike traditional processor-centric models, computation-centric models focus on the logical dependencies among instructi...
Matteo Frigo, Victor Luchangco
317
Voted

Presentation
1518views
17 years 4 months ago
Stochastic Segmentation of Blood Vessels From Time-of-Flight
In this paper, we present an automatic statistical approach for extracting 3D blood vessels from time-of-flight (TOF) magnetic resonance angiography (MRA) data. The voxels of the d...
M. Sabry Hassouna
139
Voted
ICPP
2000
IEEE
15 years 8 months ago
Multilayer VLSI Layout for Interconnection Networks
Current VLSI technology allows more than two wiring layers and the number is expected to rise in future. In this paper, we show that, by designing VLSI layouts directly for an L-l...
Chi-Hsiang Yeh, Emmanouel A. Varvarigos, Behrooz P...
117
Voted
ENGL
2008
68views more  ENGL 2008»
15 years 3 months ago
A Novel CFD Scheme for Collision of Micro-bubbles in Turbulent Flow
A numerical scheme for bubble trajectories including their collisions is developed. An Eulerian-Lagrangian computational scheme is used to study the bubble trajectories. The 2D ave...
Arman Raoufi, Mehrzad Shams, Reza Ebrahimi