: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Current methods that interactively render reasonably complex CSG objects are image based and are severely bandwidth limited. This paper presents a new approach to raytracing CSG o...
Fabiano Romeiro, Luiz Velho, Luiz Henrique de Figu...
Resource aware operation of sensor networks requires adaptive re-organization to dynamically adapt to the operational environment. A complex dynamical system of interacting compone...
The standardization of the design of learning games is a contradictory topic: The existence of a rich variety of domains and applications is in conflict with the desire for unifica...
Sebastian Kelle, Roland Klemke, Marion R. Gruber, ...
Computations on tensors have become common with the use of DT-MRI. But the classical Euclidean framework has many defects, and affine-invariant Riemannian metrics have been propose...
Vincent Arsigny, Pierre Fillard, Xavier Pennec, Ni...