Sciweavers

984 search results - page 92 / 197
» ideas 2010
Sort
View
205
Voted
SIAMSC
2010
270views more  SIAMSC 2010»
14 years 11 months ago
High Order Numerical Methods to Three Dimensional Delta Function Integrals in Level Set Methods
In this paper we propose a class of high order numerical methods to delta function integrals appearing in level set methods in the three dimensional case by extending the idea for ...
Xin Wen
96
Voted
TPDS
2010
155views more  TPDS 2010»
14 years 11 months ago
Streamline: An Optimal Distribution Algorithm for Peer-to-Peer Real-Time Streaming
—In this paper we propose and evaluate an overlay distribution algorithm for P2P, chunk-based, streaming systems over forest-based topologies. In such systems, the stream is divi...
Giuseppe Bianchi, Nicola Blefari-Melazzi, Lorenzo ...
93
Voted
WCRE
2010
IEEE
14 years 11 months ago
Visually Supporting Source Code Changes Integration: The Torch Dashboard
—Automatic and advanced merging algorithms help programmers to merge their modifications in main development repositories. However, there is little support to help release maste...
Veroonica Uquillas Gomez, Stéphane Ducasse,...
WINET
2010
136views more  WINET 2010»
14 years 11 months ago
Analysis of the Bluetooth device discovery protocol
Device discovery and connection establishment are fundamental to communication between two Bluetooth (BT) devices. In this paper, we give an analytical model of the time it takes f...
Goutam Chakraborty, Kshirasagar Naik, Debasish Cha...
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
14 years 11 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...