Sciweavers

2061 search results - page 269 / 413
» The continuous knapsack set
Sort
View
ISCC
2006
IEEE
15 years 4 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
ADC
2006
Springer
135views Database» more  ADC 2006»
15 years 4 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...
MSWIM
2006
ACM
15 years 4 months ago
Multicast in 802.11 WLANs: an experimental study
While the deployment of WiFi networks continue to grow at an explosive rate, the multicast multimedia delivery service on WiFi compliant devices is still in its early stage of dev...
Diego Dujovne, Thierry Turletti
NPAR
2006
ACM
15 years 4 months ago
X-toon: an extended toon shader
: Some example effects achieved by our extended toon shader: continuous levels of abstraction (a); abstraction of near-silhouette regions: smoothing (b), and opacity (c); backlight...
Pascal Barla, Joëlle Thollot, Lee Markosian
SIGIR
2006
ACM
15 years 4 months ago
One-sided measures for evaluating ranked retrieval effectiveness with spontaneous conversational speech
Early speech retrieval experiments focused on news broadcasts, for which adequate Automatic Speech Recognition (ASR) accuracy could be obtained. Like newspapers, news broadcasts a...
Baolong Liu, Douglas W. Oard