Sciweavers

331 search results - page 55 / 67
» Limits on Multiple Instruction Issue
Sort
View
AINA
2005
IEEE
14 years 1 months ago
Design and Implementation of IPv6 Anycast Routing Protocol: PIA-SM
Today, the use of anycast address is quite limited. One of the reasons is because there is no routing protocol providing a global anycasting service. In this paper we design and im...
Satoshi Matsunaga, Shingo Ata, Hiroshi Kitamura, M...
GRAPHITE
2005
ACM
14 years 1 months ago
Generalized sweep templates for implicit modeling
A technique is presented for generating implicit sweep objects that support direct specification and manipulation of the surface with no topological limitations on the 2D sweep t...
Ryan Schmidt, Brian Wyvill
HT
2005
ACM
14 years 1 months ago
Parsing and interpreting ambiguous structures in spatial hypermedia
When reflecting on information, spatial hypermedia users express their understanding of the information’s structure visually. In order to facilitate this process, spatial hyperm...
Luis Francisco-Revilla, Frank M. Shipman III
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
14 years 1 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
AVSS
2003
IEEE
14 years 24 days ago
A Multi-Camera Conical Imaging System for Robust 3D Motion Estimation, Positioning and Mapping from UAVs
Over the last decade, there has been an increasing interest in developing vision systems and technologies that support the operation of unmanned platforms for positioning, mapping...
Pezhman Firoozfam, Shahriar Negahdaripour