Sciweavers

5722 search results - page 536 / 1145
» Security Function Interactions
Sort
View
MOC
2010
14 years 11 months ago
A direct coupling of local discontinuous Galerkin and boundary element methods
The coupling of local discontinuous Galerkin (LDG) and boundary element methods (BEM), which has been developed recently to solve linear and nonlinear exterior transmission proble...
Gabriel N. Gatica, Norbert Heuer, Francisco-Javier...
147
Voted
SPIC
2010
14 years 11 months ago
Attention-based video streaming
This paper presents a complete framework for attention-based video streaming for low bandwidth networks. First, motivated by the fovea-periphery distinction of biological vision s...
Çagatay Dikici, H. Isil Bozma
198
Voted
POST
2012
218views more  POST 2012»
14 years 18 days ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...
PKC
2012
Springer
237views Cryptology» more  PKC 2012»
13 years 7 months ago
Relatively-Sound NIZKs and Password-Based Key-Exchange
We define a new notion of relatively-sound non-interactive zeroknowledge (NIZK) proofs, where a private verifier with access to a trapdoor continues to be sound even when the Ad...
Charanjit S. Jutla, Arnab Roy
VIS
2007
IEEE
144views Visualization» more  VIS 2007»
16 years 6 months ago
Enhancing Depth-Perception with Flexible Volumetric Halos
Volumetric data commonly has high depth complexity which makes it difficult to judge spatial relationships accurately. There are many different ways to enhance depth perception, su...
Stefan Bruckner, M. Eduard Gröller