Sciweavers

1723 search results - page 239 / 345
» Generalized file system dependencies
Sort
View
FSE
2005
Springer
116views Cryptology» more  FSE 2005»
15 years 3 months ago
Narrow T-Functions
T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building ...
Magnus Daum
76
Voted
IPTPS
2005
Springer
15 years 3 months ago
A Statistical Theory of Chord Under Churn
Most earlier studies of DHTs under churn have either depended on simulations as the primary investigation tool, or on establishing bounds for DHTs to function. In this paper, we pr...
Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurel...
ACMACE
2004
ACM
15 years 3 months ago
Extending game participation with embodied reporting agents
We introduce a multi-agent framework to generate reports of players' activities within multi-player computer games so that other players who are currently unable to participa...
Dan Fielding, Mike Fraser, Brian Logan, Steve Benf...
VRST
2004
ACM
15 years 3 months ago
Occlusion handling for medical augmented reality using a volumetric phantom model
The support of surgical interventions has long been in the focus of application-oriented augmented reality research. Modern methods of surgery, like minimally-invasive procedures,...
Jan Fischer, Dirk Bartz, Wolfgang Straßer
114
Voted
CODES
2003
IEEE
15 years 3 months ago
Deriving process networks from weakly dynamic applications in system-level design
We present an approach to the automatic derivation of executable Process Network specifications from Weakly Dynamic Applications. We introduce the notions of Dynamic Single Assig...
Todor Stefanov, Ed F. Deprettere