Sciweavers

4529 search results - page 855 / 906
» Position Based Cryptography
Sort
View
LCTRTS
2001
Springer
15 years 5 months ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...
ISPD
2000
ACM
113views Hardware» more  ISPD 2000»
15 years 5 months ago
Floorplan area minimization using Lagrangian relaxation
modules can be handled in constraint graphs efficiently. This Floorplan area minimization is an important problem because many modules have shape flexibilities during the floorplan...
Fung Yu Young, Chris C. N. Chu, W. S. Luk, Y. C. W...
120
Voted
VRML
2000
ACM
15 years 5 months ago
A spatial hierarchical compression method for 3D streaming animation
When distributing 3D contents real-time over a network with a narrow bandwidth such as a telephone line, methods for streaming and data compression can be considered indispensable...
Toshiki Hijiri, Kazuhiro Nishitani, Tim Cornish, T...
123
Voted
CCS
1999
ACM
15 years 5 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
124
Voted
ISER
1999
Springer
118views Robotics» more  ISER 1999»
15 years 5 months ago
ACME, A Telerobotic Active Measurement Facility
: We are developing a robotic measurement facility which makes it very easy to build ā€œreality-basedā€ models, i.e., computational models of existing, physical objects based on a...
Dinesh K. Pai, Jochen Lang, John E. Lloyd, Robert ...