Sciweavers

17680 search results - page 3483 / 3536
» Simulation of Computer Systems and Applications
Sort
View
178
Voted
ACISP
2004
Springer
15 years 10 months ago
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead...
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
ECCV
2004
Springer
15 years 10 months ago
CT from an Unmodified Standard Fluoroscopy Machine Using a Non-reproducible Path
3D reconstruction from image data is required in many medical procedures. Recently, the use of fluoroscopy data to generate these 3D models has been explored. Most existing methods...
Chris Baker, Christian Debrunner, Mohamed Mahfouz,...
ECCV
2004
Springer
15 years 10 months ago
Ultrasound Stimulated Vibro-acoustography
ABSTRACT We describe theoretical principles of an imaging modality that uses the acoustic response of an object to a highly localized dynamic radiation force of an ultrasound field...
James F. Greenleaf, Mostafa Fatemi, Marek Belohlav...
CLUSTER
2003
IEEE
15 years 10 months ago
A Case Study of Parallel I/O for Biological Sequence Search on Linux Clusters
In this paper we analyze the I/O access patterns of a widely-used biological sequence search tool and implement two variations that employ parallel-I/O for data access based on PV...
Yifeng Zhu, Hong Jiang, Xiao Qin, David R. Swanson
ISMAR
2003
IEEE
15 years 10 months ago
A real-time tracker for markerless augmented reality
Augmented Reality has now progressed to the point where real-time applications are being considered and needed. At the same time it is important that synthetic elements are render...
Andrew I. Comport, Éric Marchand, Fran&cced...
« Prev « First page 3483 / 3536 Last » Next »