Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Given two different drawings of a planar graph we consider the problem of morphing one drawing into the other. We designed and implemented an algorithm for intersection-free morph...
Hardware-timestamping is essential for achieving tight synchronization in networking applications. This mechanism is selectively used on few high-cost tailored systems. Actual μP...
Example-based texture synthesis algorithms generate novel texture images from example data. A popular hierarchical pixel-based approach uses spatial jitter to introduce diversity,...
Eric Risser, Charles Han, Rozenn Dahyot, Eitan Gri...
This paper focuses on fundamental similarities between proposing links for hypertexts and predicting user-requests. It briefly outlines the theoretical background of both categorie...
Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002,...