Sciweavers

6274 search results - page 850 / 1255
» Proofs, Programs, Processes
Sort
View
CGF
2011
14 years 9 months ago
Fruit Senescence and Decay Simulation
Aging and imperfections provide important visual cues for realism. We present a novel physically-based approach for simulating the biological aging and decay process in fruits. Th...
Joseph T. Kider Jr., Samantha Raja, Norman I. Badl...
CSE
2011
IEEE
14 years 5 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
16 years 6 months ago
Privacy: Theory meets Practice on the Map
In this paper, we propose the first formal privacy analysis of a data anonymization process known as the synthetic data generation, a technique becoming popular in the statistics c...
Ashwin Machanavajjhala, Daniel Kifer, John M. Abow...
ICDE
2006
IEEE
163views Database» more  ICDE 2006»
16 years 6 months ago
A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks
Wireless sensor networks generate a vast amount of data. This data, however, must be sparingly extracted to conserve energy, usually the most precious resource in battery-powered ...
Adam Silberstein, Carla Schlatter Ellis, Jun Yang ...
DAC
2009
ACM
16 years 6 months ago
Provably good and practically efficient algorithms for CMP dummy fill
Abstract--To reduce chip-scale topography variation in Chemical Mechanical Polishing (CMP) process, dummy fill is widely used to improve the layout density uniformity. Previous res...
Chunyang Feng, Hai Zhou, Changhao Yan, Jun Tao, Xu...