Sciweavers

13717 search results - page 2493 / 2744
» Control Systems
Sort
View
PADL
2001
Springer
15 years 8 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
132
Voted
RT
2001
Springer
15 years 8 months ago
Point-Based Impostors for Real-Time Visualization
Abstract. We present a new data structure for encoding the appearance of a geometric model as seen from a viewing region (view cell). This representation can be used in interactive...
Michael Wimmer, Peter Wonka, François X. Si...
142
Voted
ICRA
2000
IEEE
96views Robotics» more  ICRA 2000»
15 years 8 months ago
Design of Synchronized Supply Chains: A Six Sigma Tolerancing Approach
A supply chain network can be viewed as a network of facilities in which a customer order will flow through internal business processes such as procurement, production, and transp...
Y. Narahari, Nukala Viswanadham, R. Bhattacharya
116
Voted
INFOVIS
2000
IEEE
15 years 8 months ago
Visualizing Massive Multi-Digraphs
We describe MGV, an integrated visualization and exploration system for massive multi-digraph navigation. MGV’s only assumption is that the vertex set of the underlying digraph ...
James Abello, Jeffrey L. Korn
128
Voted
IPPS
2000
IEEE
15 years 8 months ago
Fault-Tolerant Distributed-Shared-Memory on a Broadcast-Based Interconnection Network
The Simultaneous Optical Multiprocessor Exchange Bus (SOME-Bus) is a low-latency, high-bandwidth interconnection network which directly links arbitrary pairs of processor nodes wit...
Diana Hecht, Constantine Katsinis
« Prev « First page 2493 / 2744 Last » Next »