Sciweavers

928 search results - page 103 / 186
» The degree structure of Weihrauch-reducibility
Sort
View
HIPC
2005
Springer
15 years 6 months ago
Mobile Pipelines: Parallelizing Left-Looking Algorithms Using Navigational Programming
Abstract. Parallelizing a sequential algorithm—i.e., manually or automatically converting it into an equivalent parallel distributed algorithm—is an important problem. Ideally,...
Lei Pan, Ming Kin Lai, Michael B. Dillencourt, Lub...
121
Voted
MICCAI
2005
Springer
15 years 6 months ago
Photo-Realistic Tissue Reflectance Modelling for Minimally Invasive Surgical Simulation
Computer-based simulation is an important tool for surgical skills training and assessment. In general, the degree of realism experienced by the trainees is determined by the visua...
Mohamed A. ElHelw, M. Stella Atkins, Marios Nicola...
MIDDLEWARE
2005
Springer
15 years 6 months ago
An Optimal Overlay Topology for Routing Peer-to-Peer Searches
Unstructured peer-to-peer networks are frequently used as the overlay in various middleware toolkits for emerging applications, from content discovery to query result caching to di...
Brian F. Cooper
119
Voted
MM
2004
ACM
114views Multimedia» more  MM 2004»
15 years 6 months ago
ChucK: a programming language for on-the-fly, real-time audio synthesis and multimedia
In this paper, we describe ChucK – a programming language and programming model for writing precisely timed, concurrent audio synthesis and multimedia programs. Precise concurre...
Ge Wang, Perry R. Cook
WPES
2004
ACM
15 years 6 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li