Sciweavers

1486 search results - page 287 / 298
» Algorithms for two-box covering
Sort
View
LICS
2006
IEEE
14 years 22 days ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
ASPDAC
2006
ACM
116views Hardware» more  ASPDAC 2006»
14 years 21 days ago
A robust detailed placement for mixed-size IC designs
— The rapid increase in IC design complexity and wide-spread use of intellectual-property (IP) blocks have made the so-called mixed-size placement a very important topic in recen...
Jason Cong, Min Xie
MM
2006
ACM
197views Multimedia» more  MM 2006»
14 years 20 days ago
Virtual observers in a mobile surveillance system
Conventional wide-area video surveillance systems use a network of fixed cameras positioned close to locations of interest. We describe an alternative and flexible approach to w...
Stewart Greenhill, Svetha Venkatesh
SIGMETRICS
2006
ACM
128views Hardware» more  SIGMETRICS 2006»
14 years 20 days ago
GPS scheduling: selection of optimal weights and comparison with strict priorities
We consider a system with two service classes with heterogeneous traffic characteristics and Quality-of-Service requirements. The available bandwidth is shared between the two tra...
Pascal Lieshout, Michel Mandjes, Sem C. Borst
UIST
2006
ACM
14 years 20 days ago
Projector-guided painting
This paper presents a novel interactive system for guiding artists to paint using traditional media and tools. The enabling technology is a multi-projector display capable of cont...
Matthew Flagg, James M. Rehg