Sciweavers

470 search results - page 76 / 94
» FORM facts
Sort
View
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
14 years 4 months ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
ICCV
2005
IEEE
14 years 3 months ago
Surface Parameterization Using Riemann Surface Structure
We propose a general method that parameterizes general surfaces with complex (possible branching) topology using Riemann surface structure. Rather than evolve the surface geometry...
Yalin Wang, Xianfeng Gu, Kiralee M. Hayashi, Tony ...
ICSM
2005
IEEE
14 years 3 months ago
A Safe Regression Test Selection Technique for Database-Driven Applications
Regression testing is a widely-used method for checking whether modifications to software systems have adversely affected the overall functionality. This is potentially an expens...
David Willmor, Suzanne M. Embury
ISPAN
2005
IEEE
14 years 3 months ago
Supervised Peer-to-Peer Systems
In this paper we present a general methodology for designing supervised peer-to-peer systems. A supervised peer-to-peer system is a system in which the overlay network is formed b...
Kishore Kothapalli, Christian Scheideler
SMI
2005
IEEE
111views Image Analysis» more  SMI 2005»
14 years 3 months ago
Rational Spherical Splines for Genus Zero Shape Modeling
Traditional approaches for modeling a closed manifold surface with either regular tensor-product or triangular splines (defined over an open planar domain) require decomposing th...
Ying He 0001, Xianfeng Gu, Hong Qin