Sciweavers

2693 search results - page 510 / 539
» French Order Without Order
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 7 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
CGF
2005
204views more  CGF 2005»
13 years 7 months ago
BRDF and geometry capture from extended inhomogeneous samples using flash photography
We present a technique which allows capture of 3D surface geometry and a useful class of BRDFs using extremely simple equipment. A standard digital camera with an attached flash s...
James A. Paterson, David Claus, Andrew W. Fitzgibb...
JSAC
2007
104views more  JSAC 2007»
13 years 7 months ago
Characterizing Peer-to-Peer Streaming Flows
— The fundamental advantage of peer-to-peer (P2P) multimedia streaming applications is to leverage peer upload capacities to minimize bandwidth costs on dedicated streaming serve...
Chuan Wu, Baochun Li, Shuqiao Zhao
JSAC
2007
133views more  JSAC 2007»
13 years 7 months ago
On broadcasting with cooperative diversity in multi-hop wireless networks
Abstract— Cooperative diversity facilitates spatio-temporal communications without requiring the deployment of physical antenna arrays. While physical layer studies on cooperativ...
Gentian Jakllari, Srikanth V. Krishnamurthy, Micha...
JSS
2007
105views more  JSS 2007»
13 years 7 months ago
Composing pattern-based components and verifying correctness
Designing large software systems out of reusable components has become increasingly popular. Although liberal composition of reusable components saves time and expense, many exper...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan, S...