Sciweavers

1218 search results - page 30 / 244
» The many facets of natural computing
Sort
View
CONCUR
2008
Springer
14 years 11 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
IJCV
1998
102views more  IJCV 1998»
14 years 9 months ago
Improved Diffuse Reflection Models for Computer Vision
There are many computational vision techniques that fundamentally rely upon assumptions about the nature of diffuse reflection from object surfaces consisting of commonly occurrin...
Lawrence B. Wolff, Shree K. Nayar, Michael Oren
ICMS
2010
14 years 8 months ago
The Design of Core 2: A Library for Exact Numeric Computation in Geometry and Algebra
There is a growing interest in numeric-algebraic techniques in the computer algebra community as such techniques can speed up many applications. This paper is concerned with one su...
Jihun Yu, Chee Yap, Zilin Du, Sylvain Pion, Herv&e...
RSFDGRC
2011
Springer
255views Data Mining» more  RSFDGRC 2011»
14 years 10 days ago
Construction and Analysis of Web-Based Computer Science Information Networks
WINACS (Web-based Information Network Analysis for Computer Science) is a project that incorporates many recent, exciting developments in data sciences to construct a Web-based co...
Jiawei Han
GCC
2003
Springer
15 years 2 months ago
Network Behavior Analysis Based on a Computer Network Model
This paper applies a new traffic model, iterated function systems (IFS) for network traffic modelling, to explore computer network behaviour and analyse network performance. IFS mo...
Weili Han, Shuai Dianxun, Yujun Liu