Sciweavers

819 search results - page 123 / 164
» Acknowledgements
Sort
View
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
14 years 28 days ago
Resource adaptation based on MPEG-21 usage environment descriptions
This paper addresses several aspects related to the distribution of content. The first aim is to provide an overview of the Universal Multimedia Access (UMA) concept. The primary...
Huifang Sun, Anthony Vetro, K. Asai
SC
2003
ACM
14 years 27 days ago
Optimizing 10-Gigabit Ethernet for Networks of Workstations, Clusters, and Grids: A Case Study
This paper presents a case study of the 10-Gigabit Ethernet (10GbE) adapter from Intel R . Specifically, with appropriate optimizations to the configurations of the 10GbE adapte...
Wu-chun Feng, Justin Gus Hurwitz, Harvey B. Newman...
SI3D
2003
ACM
14 years 27 days ago
Opacity light fields: interactive rendering of surface light fields with view-dependent opacity
We present new hardware-accelerated techniques for rendering surface light fields with opacity hulls that allow for interactive visualization of objects that have complex reflec...
Daniel Vlasic, Hanspeter Pfister, Sergey Molinov, ...
AMKM
2003
Springer
14 years 26 days ago
Integrating External Sources in a Corporate Semantic Web Managed by a Multi-agent System
We first describe a multi-agent system managing a corporate memory in the form of a corporate semantic web. We then focus on a newly introduced society of agents in charge of wrap...
Tuan-Dung Cao, Fabien Gandon
FSTTCS
2003
Springer
14 years 26 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh