Sciweavers

223 search results - page 15 / 45
» Looking back and forward
Sort
View

Publication
304views
15 years 7 months ago
A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with Connectionless Network Layer
We propose a scheme for congestion avoidance in networks using a connectionless protocol at the network layer. The scheme uses a minimal amount of feedback from the network to the ...
K. Ramakrishnan and R. Jain
ICPR
2008
IEEE
14 years 10 months ago
A practical method to reducing metal artifact for dental CT scanners
An integrated and effective metal artifact reduction method named Metal Erasing (ME) especially suited to dental applications is proposed. Layout of metals is identified as metal-...
Atsushi Katsumata, Koichi Ito, Koji Kobayashi, Tak...
CSFW
2009
IEEE
14 years 3 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...
ER
2009
Springer
104views Database» more  ER 2009»
14 years 3 months ago
Modelling Safe Interface Interactions in Web Applications
Abstract. Current Web applications embed sophisticated user interfaces and business logic. The original interaction paradigm of the Web based on static content pages that are brows...
Marco Brambilla, Jordi Cabot, Michael Grossniklaus
APSCC
2008
IEEE
14 years 3 months ago
Planning Locative Media within Physical Space and Collaborative Workspace
As internet technology develops, we transfer more and more physical activities into cyberspace. On the other hand, mobile technology frees the location of cyberspace participants,...
Rung-Huei Liang, Yin-Huan Chen