Sciweavers

2767 search results - page 339 / 554
» Universal Exponentiation Algorithm
Sort
View
VIS
2005
IEEE
128views Visualization» more  VIS 2005»
16 years 3 months ago
Hardware-Accelerated Simulated Radiography
We present the application of hardware accelerated volume rendering algorithms to the simulation of radiographs as an aid to scientists designing experiments, validating simulatio...
Cláudio T. Silva, Daniel E. Laney, Nelson L...
129
Voted
INFOCOM
2007
IEEE
15 years 8 months ago
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information
Abstract—We propose a novel algorithm for detecting wormhole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substr...
Ritesh Maheshwari, Jie Gao, Samir R. Das
ICWL
2005
Springer
15 years 7 months ago
The Research of Mining Association Rules Between Personality and Behavior of Learner Under Web-Based Learning Environment
: Discovering the relationship between behavior and personality of learner in the web-based learning environment is a key to guide learners in the learning process. This paper prop...
Jin Du, Qinghua Zheng, Haifei Li, Wenbin Yuan
CORR
2010
Springer
92views Education» more  CORR 2010»
15 years 2 months ago
Exact counting of Euler Tours for generalized series-parallel graphs
We give a simple polynomial-time algorithm to exactly count the number of Euler Tours (ETs) of any Eulerian generalized series-parallel graph, and show how to adapt this algorithm...
Prasad Chebolu, Mary Cryan, Russell A. Martin
PODC
2006
ACM
15 years 8 months ago
Computing separable functions via gossip
Motivated by applications to sensor, peer-to-peer, and adhoc networks, we study the problem of computing functions of values at the nodes in a network in a totally distributed man...
Damon Mosk-Aoyama, Devavrat Shah