Sciweavers

102291 search results - page 20224 / 20459
» Computing
Sort
View
JCP
2007
121views more  JCP 2007»
15 years 2 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
TOCS
2008
131views more  TOCS 2008»
15 years 2 months ago
A generic component model for building systems software
Component-based software structuring principles are now commonly and successfully applied at the application level; but componentisation is far less established when it comes to b...
Geoff Coulson, Gordon S. Blair, Paul Grace, Fran&c...
TOG
2008
293views more  TOG 2008»
15 years 2 months ago
A perceptually validated model for surface depth hallucination
Capturing detailed surface geometry currently requires specialized equipment such as laser range scanners, which despite their high accuracy, leave gaps in the surfaces that must ...
Mashhuda Glencross, Gregory J. Ward, Francho Melen...
TOG
2008
180views more  TOG 2008»
15 years 2 months ago
Diffusion curves: a vector representation for smooth-shaded images
We describe a new vector-based primitive for creating smoothshaded images, called the diffusion curve. A diffusion curve partitions the space through which it is drawn, defining d...
Alexandrina Orzan, Adrien Bousseau, Holger Winnem&...
CCR
2005
97views more  CCR 2005»
15 years 2 months ago
On the robustness of router-based denial-of-service (DoS) defense systems
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
Ying Xu, Roch Guérin
« Prev « First page 20224 / 20459 Last » Next »