Abstract Bloom filters are extensively used in distributed applications, especially in distributed databases and distributed information systems, to reduce network requirements and...
Odysseas Papapetrou, Wolf Siberski, Wolfgang Nejdl
We present an on-line crosslayer control technique to characterize and approximate optimal policies for wireless networks. Our approach combines network utility maximization and ad...
—We present an application of interactive global illumination and spatially augmented reality to architectural daylight modeling that allows designers to explore alternative desi...
Yu Sheng, Theodore C. Yapo, Christopher Young, Bar...
This work presents an approach to the obstacle avoidance problem, applicable in the frame of driver assistance. A decision, expressed as a proposed acceleration vector for the veh...
Franck Gechter, Jean-Michel Contet, Pablo Gruer, A...
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...