Sciweavers

1147 search results - page 105 / 230
» Transformation of Access Rights
Sort
View
SIROCCO
1998
15 years 2 months ago
The counting pyramid: an adaptive distributed counting scheme
A distributed counter is a concurrent object which provides a fetch-and-increment operation on a shared value. On the basis of a distributed counter, one can implement various fun...
Roger Wattenhofer, Peter Widmayer
96
Voted
CN
2007
97views more  CN 2007»
15 years 25 days ago
Security enhancement of an IC-card-based remote login mechanism
Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand th...
Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang
IVC
2007
90views more  IVC 2007»
15 years 22 days ago
Which is the best way to organize/classify images by content?
Thousands of images are generated every day, which implies the necessity to classify, organise and access them using an easy, faster and efficient way. Scene classification, the ...
Anna Bosch, Xavier Muñoz, Robert Marti
CG
2004
Springer
15 years 20 days ago
Compression of soft-body animation sequences
We describe a compression scheme for the geometry component of 3D animation sequences. This scheme is based on the principle component analysis (PCA) method, which represents the ...
Zachi Karni, Craig Gotsman
107
Voted
CN
1999
98views more  CN 1999»
15 years 15 days ago
Managing application level quality of service through TOMTEN
With the growth of mobile computing, users will have simultaneous access to multiple overlaid networks, each with Zdifferent characteristics, services and costs. This paper introd...
R. De Silva, Björn Landfeldt, Sebastien Ardon...