Sciweavers

3356 search results - page 334 / 672
» Determining Consensus Numbers
Sort
View
89
Voted
CN
2007
141views more  CN 2007»
15 years 24 days ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
CORR
2007
Springer
105views Education» more  CORR 2007»
15 years 24 days ago
The source coding game with a cheating switcher
Motivated by the lossy compression of an active-vision video stream, we consider the problem of finding the rate-distortion function of an arbitrarily varying source (AVS) compos...
Hari Palaiyanur, Cheng Chang, Anant Sahai
INFSOF
2006
66views more  INFSOF 2006»
15 years 24 days ago
Scenario-based multitasking for real-time object-oriented models
Contemporary embedded systems quite often employ extremely complicated software consisting of a number of interrelated components, and this has made object-oriented design methodo...
Saehwa Kim, Jiyong Park, Seongsoo Hong
104
Voted
JGTOOLS
2006
107views more  JGTOOLS 2006»
15 years 23 days ago
Efficient Shadows for Sampled Environment Maps
This paper addresses the problem of efficiently calculating shadows from environment maps in the context of ray-tracing. Since accurate rendering of shadows from environment maps ...
Aner Ben-Artzi, Ravi Ramamoorthi, Maneesh Agrawala
84
Voted
ENDM
2007
74views more  ENDM 2007»
15 years 23 days ago
The order of the largest complete minor in a random graph
Let ccl(G) denote the order of the largest complete minor in a graph G (also called the contraction clique number) and let Gn,p denote a random graph on n vertices with edge probab...
Nikolaos Fountoulakis, Daniela Kühn, Deryk Os...