Sciweavers

4150 search results - page 756 / 830
» A Practical Approach to Model Extension
Sort
View
CGF
2010
177views more  CGF 2010»
13 years 9 months ago
Condenser-Based Instant Reflectometry
We present a technique for rapid capture of high quality bidirectional reflection distribution functions(BRDFs) of surface points. Our method represents the BRDF at each point by ...
Yanxiang Lan, Yue Dong, Jiaping Wang, Xin Tong, Ba...
TON
2010
157views more  TON 2010»
13 years 5 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
SAC
2010
ACM
14 years 5 months ago
Implementing software product lines using traits
A software product line (SPL) is a set of software systems with well-defined commonalities and variabilities that are developed by managed reuse of common artifacts. In this pape...
Lorenzo Bettini, Ferruccio Damiani, Ina Schaefer
ACNS
2008
Springer
138views Cryptology» more  ACNS 2008»
14 years 5 months ago
Traceable and Retrievable Identity-Based Encryption
Abstract. Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susil...
MICRO
2007
IEEE
167views Hardware» more  MICRO 2007»
14 years 5 months ago
Informed Microarchitecture Design Space Exploration Using Workload Dynamics
Program runtime characteristics exhibit significant variation. As microprocessor architectures become more complex, their efficiency depends on the capability of adapting with wor...
Chang-Burm Cho, Wangyuan Zhang, Tao Li