Sciweavers

5548 search results - page 971 / 1110
» Programming a Distributed System Using Shared Objects
Sort
View
TVCG
2008
103views more  TVCG 2008»
15 years 4 months ago
Perceptually Guided Polygon Reduction
The properties of the human visual system are taken into account, along with the geometric aspects of an object, in a new surface remeshing algorithm and a new mesh simplification ...
Lijun Qu, Gary W. Meyer
VIROLOGY
2010
165views more  VIROLOGY 2010»
14 years 11 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
STOC
2002
ACM
156views Algorithms» more  STOC 2002»
16 years 5 months ago
Selfish traffic allocation for server farms
We investigate the price of selfish routing in non-cooperative networks in terms of the coordination and bicriteria ratios in the recently introduced game theoretic network model ...
Artur Czumaj, Piotr Krysta, Berthold Vöcking
SAC
2009
ACM
15 years 11 months ago
Attention driven visual processing for an interactive dialog robot
In this paper we propose an attention-based vision system for the JAST interactive dialog robot. The robotic vision system incorporates three submodules: object recognition, gestu...
Thomas Müller, Alois Knoll
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 11 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...