Sciweavers

1498 search results - page 264 / 300
» Network control as a distributed object application
Sort
View
CCS
2006
ACM
15 years 1 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
IPPS
2008
IEEE
15 years 4 months ago
Wait-free Programming for General Purpose Computations on Graphics Processors
The fact that graphics processors (GPUs) are today’s most powerful computational hardware for the dollar has motivated researchers to utilize the ubiquitous and powerful GPUs fo...
Phuong Hoai Ha, Philippas Tsigas, Otto J. Anshus
SAC
2008
ACM
14 years 9 months ago
A biologically inspired generation of virtual characters
A number of techniques for generating geometric models of human head and body are in use nowadays. Models of human characters are useful in computer games, virtual reality, and ma...
Roberto C. Cavalcante Vieira, Creto Augusto Vidal,...
RAM
2008
IEEE
137views Robotics» more  RAM 2008»
15 years 4 months ago
Middleware for Robotics: A Survey
—The field of robotics relies heavily on various technologies such as mechatronics, computing systems, and wireless communication. Given the fast growing technological progress i...
Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar
FC
2008
Springer
82views Cryptology» more  FC 2008»
14 years 11 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine