Sciweavers

25175 search results - page 4990 / 5035
» MPEG-4 systems and applications
Sort
View
JAL
2006
114views more  JAL 2006»
13 years 8 months ago
A wide-range algorithm for minimal triangulation from an arbitrary ordering
We present a new algorithm, called LB-Triang, which computes minimal triangulations. We give both a straightforward O(nm0) time implementation and a more involved O(nm) time imple...
Anne Berry, Jean Paul Bordat, Pinar Heggernes, Gen...
JSA
2008
91views more  JSA 2008»
13 years 8 months ago
Using supplier locality in power-aware interconnects and caches in chip multiprocessors
Conventional snoopy-based chip multiprocessors take an aggressive approach broadcasting snoop requests to all nodes. In addition each node checks all received requests. This appro...
Ehsan Atoofian, Amirali Baniasadi
JUCS
2008
156views more  JUCS 2008»
13 years 8 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JUCS
2008
113views more  JUCS 2008»
13 years 8 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JUCS
2008
123views more  JUCS 2008»
13 years 8 months ago
Beyond ASCII - Parsing Programs with Graphical Presentations
: Proxima is a generic structure editor suitable for a wide range of structured document types. It allows edit operations on the document structure as well as on its screen represe...
Martijn M. Schrage, S. Doaitse Swierstra
« Prev « First page 4990 / 5035 Last » Next »