Sciweavers

17582 search results - page 3100 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
EDCC
2005
Springer
15 years 10 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...
RT
2005
Springer
15 years 10 months ago
Bidirectional Importance Sampling for Direct Illumination
Image-based representations for illumination can capture complex real-world lighting that is difficult to represent in other forms. Current importance sampling strategies for ima...
David Burke, Abhijeet Ghosh, Wolfgang Heidrich
SAC
2004
ACM
15 years 10 months ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
157
Voted
ECCV
2004
Springer
15 years 10 months ago
A Multi-scale Geometric Flow for Segmenting Vasculature in MRI
Often in neurosurgical planning a dual echo acquisition is performed that yields proton density (PD) and T2-weighted images to evaluate edema near a tumour or lesion. The developme...
Maxime Descoteaux, D. Louis Collins, Kaleem Siddiq...
117
Voted
NOSSDAV
2004
Springer
15 years 10 months ago
Considering altruism in peer-to-peer internet streaming broadcast
In peer-to-peer overlay for video broadcast, peers contribute a portion of the bandwidth to the overlay in return for the service. In the presence of network heterogeneity, it is ...
Yang-Hua Chu, Hui Zhang
« Prev « First page 3100 / 3517 Last » Next »