Sciweavers

1096 search results - page 154 / 220
» Computation Slicing: Techniques and Theory
Sort
View
ASIACRYPT
2000
Springer
14 years 2 months ago
Unconditionally Secure Digital Signature Schemes Admitting Transferability
A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new gen...
Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hi...
ICVS
1999
Springer
14 years 1 months ago
Improving 3D Active Visual Tracking
Tracking in 3D with an active vision system depends on the performance of both motor control and vision algorithms. Tracking is performed based on different visual behaviors, name...
João P. Barreto, Paulo Peixoto, Jorge Batis...
KIVS
1999
Springer
14 years 1 months ago
Cost and Price Calculation for Internet Integrated Services
Abstract Charging schemes are needed to protect an integrated services network from arbitrary resource reservations and to create a funding mechanism to extend network capacity at ...
Martin Karsten, Jens Schmitt, Lars C. Wolf, Ralf S...
EUROPAR
1998
Springer
14 years 1 months ago
Enhancing Spatial Locality via Data Layout Optimizations
This paper aims to improve locality of references by suitably choosing array layouts. We use a new definition of spatial reuse vectors that takes into account memory layout of arra...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
SOFSEM
1998
Springer
14 years 1 months ago
Some Results on the Modelling of Spatial Data
Abstract. Formal methods based on the mathematical theory of partially ordered sets (i.e., posets) have been used in the database field for the modelling of spatial data since many...
Luca Forlizzi, Enrico Nardelli