Sciweavers

3954 search results - page 660 / 791
» Image-based Model Completion
Sort
View
109
Voted
CN
2007
80views more  CN 2007»
15 years 2 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
118
Voted
COMBINATORICS
2007
60views more  COMBINATORICS 2007»
15 years 2 months ago
Higher Spin Alternating Sign Matrices
We define a higher spin alternating sign matrix to be an integer-entry square matrix in which, for a nonnegative integer r, all complete row and column sums are r, and all partia...
Roger E. Behrend, Vincent A. Knight
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 2 months ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang
JAR
2008
107views more  JAR 2008»
15 years 2 months ago
Differential Dynamic Logic for Hybrid Systems
Hybrid systems are models for complex physical systems and are defined as dynamical systems with interacting discrete transitions and continuous evolutions along differential equat...
André Platzer
JGTOOLS
2008
189views more  JGTOOLS 2008»
15 years 2 months ago
Subtractive Shadows: A Flexible Framework for Shadow Level of Detail
Abstract. We explore the implications of reversing the process of shadow computation for real-time applications that model complex reflectance and lighting (such as that specified ...
Christopher DeCoro, Szymon Rusinkiewicz