Sciweavers

1794 search results - page 268 / 359
» Visualizing Memory Graphs
Sort
View
RFIDSEC
2010
15 years 21 days ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
HOTNETS
2010
14 years 9 months ago
Packet re-cycling: eliminating packet losses due to network failures
This paper presents Packet Re-cycling (PR), a technique that takes advantage of cellular graph embeddings to reroute packets that would otherwise be dropped in case of link or nod...
Suksant Sae Lor, Raul Landa, Miguel Rio
112
Voted
VISUALIZATION
2005
IEEE
15 years 8 months ago
Topology-driven Surface Mappings with Robust Feature Alignment
Topological concepts and techniques have been broadly applied in computer graphics and geometric modeling. However, the homotopy type of a mapping between two surfaces has not bee...
Christopher Carner, Miao Jin, Xianfeng Gu, Hong Qi...
URBAN
2011
185views more  URBAN 2011»
14 years 9 months ago
Supporting geographically-aware web document foraging and sensemaking
This paper reports on the development and application of strategies and tools for geographic information seeking and knowledge building that leverages unstructured text resources ...
Brian M. Tomaszewski, Justine Blanford, Kevin Ross...
ICIP
1999
IEEE
16 years 3 months ago
Simplified Segmentation for Compound Image Compression
There are three basic segmentation schemes for compound image compression: object-based, layer-based, and block-based. This work discusses the relative advantages of each scheme a...
Amir Said, Alexander Drukarev