Sciweavers

1734 search results - page 220 / 347
» What works
Sort
View
99
Voted
CW
2004
IEEE
15 years 4 months ago
Modeling of Bodies and Clothes for Virtual Environments
Although graphical human modeling has been a long sought subject in computer graphics, when it comes to dealing with real-time applications, it raises a number of unique requireme...
Nadia Magnenat-Thalmann, Frederic Cordier, Hyewon ...
114
Voted
EDO
2006
Springer
15 years 4 months ago
Tailoring an architectural middleware platform to a heterogeneous embedded environment
Embedded systems are rapidly growing in size, complexity, distribution, and heterogeneity. As a result, the traditional practice of developing one-off embedded applications that a...
Sam Malek, Chiyoung Seo, Nenad Medvidovic
92
Voted
ESAW
2006
Springer
15 years 4 months ago
A Norm-Governed Systems Perspective of Ad Hoc Networks
Ad hoc networks are a type of computational system whose members may fail to, or choose not to, comply with the laws governing their behaviour. We are investigating to what extent ...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt
90
Voted
EUROPAR
2006
Springer
15 years 4 months ago
Coupling Contracts for Deployment on Alien Grids
We propose coupling based on contracts as a mechanism to address the problem of exchanging information between parties that require information to work together. Specifically, we s...
Javier Bustos-Jiménez, Denis Caromel, Mario...
FSE
2006
Springer
137views Cryptology» more  FSE 2006»
15 years 4 months ago
A Study of the MD5 Attacks: Insights and Improvements
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wa...
John Black, Martin Cochran, Trevor Highland