Sciweavers

1199 search results - page 231 / 240
» How to Compare the Power of Computational Models
Sort
View
91
Voted
ASIACRYPT
2007
Springer
15 years 5 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
IAT
2005
IEEE
15 years 5 months ago
Dynamic Lightpath Protection in WDM optical Networks Using Ant-based Mobile Agents
In this paper, we consider the problem of dynamic lightpath protection in survivable WDM networks with single link failure model. Our work concerns in how to dynamically determine...
Son-Hong Ngo, Xiaohong Jiang, Susumu Horiguchi
112
Voted
SIGGRAPH
1999
ACM
15 years 3 months ago
Environment Matting and Compositing
This paper introduces a new process, environment matting, which captures not just a foreground object and its traditional opacity matte from a real-world scene, but also a descrip...
Douglas E. Zongker, Dawn M. Werner, Brian Curless,...
SEMWEB
2009
Springer
15 years 4 months ago
Semantic Web Service Composition in Social Environments
This paper describes how to generate compositions of semantic Web services using social trust information from user ratings of the services. We present a taxonomy of features, suc...
Ugur Kuter, Jennifer Golbeck
81
Voted
VIS
2008
IEEE
114views Visualization» more  VIS 2008»
16 years 27 days ago
Continuous Scatterplots
Abstract--Scatterplots are well established means of visualizing discrete data values with two data variables as a collection of discrete points. We aim at generalizing the concept...
Sven Bachthaler, Daniel Weiskopf