Sciweavers

5799 search results - page 989 / 1160
» Patterns Generate Architectures
Sort
View
123
Voted
ATAL
2004
Springer
15 years 9 months ago
Agents Swarming in Semantic Spaces to Corroborate Hypotheses
To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to supp...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...
121
Voted
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
15 years 9 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
122
Voted
EGH
2004
Springer
15 years 9 months ago
A hierarchical shadow volume algorithm
The shadow volume algorithm is a popular technique for real-time shadow generation using graphics hardware. Its major disadvantage is that it is inherently fillrate-limited, as t...
Timo Aila, Tomas Akenine-Möller
180
Voted
EGPGV
2004
Springer
214views Visualization» more  EGPGV 2004»
15 years 9 months ago
Hierarchical Visualization and Compression of Large Volume Datasets Using GPU Clusters
We describe a system for the texture-based direct volume visualization of large data sets on a PC cluster equipped with GPUs. The data is partitioned into volume bricks in object ...
Magnus Strengert, Marcelo Magallón, Daniel ...
134
Voted
ESTIMEDIA
2004
Springer
15 years 9 months ago
A hardware accelerator IP for EBCOT Tier-1 coding in JPEG2000 Standard
We proposed a hardware accelerator IP for the Tier-1 portion of Embedded Block Coding with Optimal Truncation (EBCOT) used in the JPEG2000 next generation image compression standa...
Tien-Wei Hsieh, Youn-Long Lin