We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Abstract--Generic file sharing P2P applications have gained high popularity in the past few years. In particular P2P streaming architectures have attracted attention. Some of them ...
Distances in immersive virtual environments (VEs) have been commonly reported as being spatially compressed while the same judgments are performed accurately in real space. Previo...
Scott A. Kuhl, William B. Thompson, Sarah H. Creem...
Conditional Access System (CAS) performs entitlement management to make only legitimate subscribers watch pay-services. Generally, CAS uses passive entitlement management to fulfil...
Han-Seung Koo, Il-Kyoo Lee, Jae-Myung Kim, Sung-Wo...
In recent years several methods for modeling botanical trees have been proposed. The geometry and topology of tree skeletons can be well described by L-systems; however, there are...