Sciweavers

6318 search results - page 1243 / 1264
» Data Leakage Detection
Sort
View
CGF
2008
201views more  CGF 2008»
14 years 9 months ago
High-Resolution Volumetric Computation of Offset Surfaces with Feature Preservation
We present a new algorithm for the efficient and reliable generation of offset surfaces for polygonal meshes. The algorithm is robust with respect to degenerate configurations and...
Darko Pavic, Leif Kobbelt
CN
2008
163views more  CN 2008»
14 years 9 months ago
Loss-resilient window-based congestion control
This paper addresses the problem of fair allocation of bandwidth resources on lossy channels in hybrid heterogeneous networks. It discusses more particularly the ability of window...
Christophe De Vleeschouwer, Pascal Frossard
COMPUTER
2008
86views more  COMPUTER 2008»
14 years 9 months ago
Supporting Acquisition of Basic Skills
ors induce aptitudes: abstract skills and knowledge. Mentors foster attitudes: social skills and graces. In my experience of school, starting 70 years or so ago, quite regimented i...
W. Neville Holmes
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 9 months ago
Adaptive Demodulation in Differentially Coherent Phase Systems: Design and Performance Analysis
Adaptive Demodulation (ADM) is a newly proposed rate-adaptive system which operates without requiring Channel State Information (CSI) at the transmitter (unlike adaptive modulatio...
J. David Brown, Jamshid Abouei, Konstantinos N. Pl...
CORR
2008
Springer
112views Education» more  CORR 2008»
14 years 9 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
« Prev « First page 1243 / 1264 Last » Next »