Sciweavers

963 search results - page 141 / 193
» Conditional Digital Signatures
Sort
View
IMC
2006
ACM
14 years 3 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan

Publication
767views
15 years 8 months ago
Analysis of the Increase/Decrease Algorithms for Congestion Avoidance in Computer Networks
Congestion avoidance mechanisms allow a network to operate in the optimal region of low delay and high throughput, thereby, preventing the network from becoming congested. This is ...
D. Chiu and R. Jain
CVPR
1999
IEEE
14 years 12 months ago
Extracting Textured Vertical Facades From Controlled Close-Range Imagery
We are developing a system to extract geodetic, textured CAD models from thousands of initially uncontrolled, close-range ground and aerial images of urban scenes. Here we describ...
Satyan R. Coorg, Seth J. Teller
CVPR
2001
IEEE
14 years 12 months ago
Geometric Distributions for Catadioptric Sensor Design
We present a general method of catadioptric sensor design for realizing prescribed projections. Our method makes use of geometric distributions in 3-dimensional space, which are g...
R. Andrew Hicks, Ronald K. Perline
CVPR
2003
IEEE
14 years 12 months ago
Automatic Relighting of Overlapping Textures of a 3D Model
This paper presents a new method to correct overlapping textures of a single 3D model where each texture was obtained under possibly different lighting conditions and color respon...
Etienne Beauchesne, Sébastien Roy