Sciweavers

4163 search results - page 679 / 833
» Enhancing surgical systems
Sort
View
ACSAC
2001
IEEE
14 years 26 days ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
FMCAD
2000
Springer
14 years 25 days ago
Scalable Distributed On-the-Fly Symbolic Model Checking
Abstract. This paper presents a scalable method for parallel symbolic on-the-fly model checking in a distributed memory environment. Our method combines a scheme for on-the-fly mod...
Shoham Ben-David, Tamir Heyman, Orna Grumberg, Ass...
SIGGRAPH
1998
ACM
14 years 24 days ago
Interactive Reflections on Curved Objects
Global view-dependent illumination phenomena, in particular reflections, greatly enhance the realism of computer-generated imagery. Current interactive rendering methods do not pr...
Eyal Ofek, Ari Rappoport
ISN
2000
Springer
120views Communications» more  ISN 2000»
14 years 24 days ago
Providing Customisable Network Management Services Through Mobile Agents
Telecommunications network management has attracted a lot of attention in terms of research and standardisation in the last decade. TMN and TINA architectural frameworks try to add...
David Griffin, George Pavlou, Panos Georgatsos
EDBT
2010
ACM
155views Database» more  EDBT 2010»
14 years 16 days ago
Suffix tree construction algorithms on modern hardware
Suffix trees are indexing structures that enhance the performance of numerous string processing algorithms. In this paper, we propose cache-conscious suffix tree construction algo...
Dimitris Tsirogiannis, Nick Koudas