Sciweavers

578 search results - page 53 / 116
» Integrating Computation into the Physics Curriculum
Sort
View
TOG
2008
123views more  TOG 2008»
14 years 9 months ago
Efficient multiple scattering in hair using spherical harmonics
Previous research has shown that a global multiple scattering simulation is needed to achieve physically realistic renderings of hair, particularly light-colored hair with low abs...
Jonathan T. Moon, Bruce Walter, Steve Marschner
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 3 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
ACSAC
2006
IEEE
15 years 3 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
PERCOM
2009
ACM
15 years 10 months ago
P2P over MANET: Indirect Tree-based Routing
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Marcello Caleffi, Luigi Paura
IMSCCS
2006
IEEE
15 years 3 months ago
An Adaptive Agent-Based Network for Distributed Component Repositories
The application of component repository has become more and more popular in the practice of component-based software development. Most of the repositories are physically isolated ...
Yunjiao Xue, Leqiu Qian, Ruzhi Xu, Bin Tang, Xin P...