Sciweavers

10700 search results - page 1957 / 2140
» Generative Design Patterns
Sort
View
143
Voted
FSTTCS
2003
Springer
15 years 10 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
153
Voted
IMR
2003
Springer
15 years 10 months ago
An Adaptable Surface Parameterization Method
Parameterizations of triangulated surfaces are used in an increasing number of mesh processing applications for various purposes. Although demands vary, they are often required to...
Patrick Degener, Jan Meseth, Reinhard Klein
ICRA
2002
IEEE
101views Robotics» more  ICRA 2002»
15 years 10 months ago
Rover Autonomy for Long Range Navigation and Science Data Acquisition on Planetary Surfaces
This paper describes recent work undertaken at the Jet Propulsion Laboratory in Pasadena, CA in the area of increased rover autonomy for planetary surface operations. The primary ...
Terrance L. Huntsberger, Hrand Aghazarian, Yang Ch...
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
15 years 9 months ago
Large graph processing in the cloud
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
Rishan Chen, Xuetian Weng, Bingsheng He, Mao Yang
156
Voted
SIGMOD
2010
ACM
305views Database» more  SIGMOD 2010»
15 years 9 months ago
MoveMine: mining moving object databases
With the maturity of GPS, wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and...
Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yint...
« Prev « First page 1957 / 2140 Last » Next »