Sciweavers

336 search results - page 32 / 68
» Implementing CCS in Maude
Sort
View
CCS
2003
ACM
14 years 29 days ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
CCS
2011
ACM
12 years 7 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
EGH
2005
Springer
14 years 1 months ago
Split-plane shadow volumes
We present a novel method for rendering shadow volumes. The core idea of the method is to locally choose between Z-pass and Z-fail algorithms on a per-tile basis. The choice is ma...
Samuli Laine
EGPGV
2004
Springer
143views Visualization» more  EGPGV 2004»
14 years 1 months ago
Massive Data Pre-Processing with a Cluster Based Approach
Data coming from complex simulation models reach easily dimensions much greater than available computational resources. Visualization of such data still represents the most intuit...
Rita Borgo, Valerio Pascucci, Roberto Scopigno
RT
2004
Springer
14 years 1 months ago
Feature-Based Textures
This paper introduces feature-based textures, a new image representation that combines features and samples for high-quality texture mapping. Features identify boundaries within a...
Ganesh Ramanarayanan, Kavita Bala, Bruce Walter