Sciweavers

2383 search results - page 404 / 477
» Anticipatory Behavioral Control
Sort
View
ENTCS
2008
130views more  ENTCS 2008»
13 years 7 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
CGF
2006
130views more  CGF 2006»
13 years 7 months ago
Wrinkling Coarse Meshes on the GPU
The simulation of complex layers of folds of cloth can be handled through algorithms which take the physical dynamics into account. In many cases, however, it is sufficient to gen...
Jörn Loviscach
IJSNET
2008
114views more  IJSNET 2008»
13 years 7 months ago
PERT: a new power-efficient real-time packet delivery scheme for sensor networks
Abstract: We present PERT, a power-efficient scheme to deliver real-time data packets in sensor networks. Time-sensitive sensor data is common in applications such as hazard monito...
Shanzhong Zhu, Wei Wang, Chinya V. Ravishankar
CN
2007
103views more  CN 2007»
13 years 7 months ago
A game theoretic comparison of TCP and digital fountain based protocols
In this paper we analyze a novel paradigm of reliable communication which is not based on the traditional timeout-andretransmit mechanism of TCP. Our approach, which we call Fount...
Luis López, Antonio Fernández, Vicen...
COMSIS
2007
128views more  COMSIS 2007»
13 years 7 months ago
Constructing program animations using a pattern-based approach
The aim of this paper is to discuss how our pattern-based strategy for the visualization of data and control flow can effectively be used to animate the program and exhibit its beh...
Daniela Carneiro da Cruz, Pedro Rangel Henriques, ...