Sciweavers

5722 search results - page 217 / 1145
» Security Function Interactions
Sort
View
VISSYM
2004
15 years 2 months ago
Interactively Visualizing Procedurally Encoded Scalar Fields
Figure 1: RBF reconstruction of unstructured CFD data. (a) Volume rendering of 1,943,383 tetrahedral shock data set using 2,932 RBF functions. (b) Volume rendering of a 156,642 te...
Yun Jang, Manfred Weiler, Matthias Hopf, Jingshu H...
CGF
2008
141views more  CGF 2008»
15 years 1 months ago
Interactive Visualization of Multimodal Volume Data for Neurosurgical Tumor Treatment
Teaser Figure: Left: Brain, visualized using silhouettes, the lesion's spatial depth is displayed using a ring. Center: Combined rendering of brain tissue, skull and fiber tr...
Christian Rieder, Felix Ritter, Matthias Raspe, He...
GI
2009
Springer
15 years 5 months ago
Discovery of Smart Objects in Ubiquitous Environments and the Need for Interaction Metaphors
: In ubiquitous environments computers and smart devices, especially the technical view on them, disappear and users are supported to concentrate on the tasks they actually intend ...
René Reiners
OOPSLA
2004
Springer
15 years 6 months ago
Resolving feature convolution in middleware systems
Middleware provides simplicity and uniformity for the development of distributed applications. However, the modularity of the architecture of middleware is starting to disintegrat...
Charles Zhang, Hans-Arno Jacobsen
108
Voted
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
15 years 7 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell