Sciweavers

2184 search results - page 267 / 437
» Modeling and Realizing Interoperability
Sort
View
JCS
2010
121views more  JCS 2010»
13 years 6 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
MODELS
2010
Springer
13 years 6 months ago
Inferring Meta-models for Runtime System Data from the Clients of Management APIs
Abstract. A new trend in runtime system monitoring is to utilize MOFbased techniques in analyzing the runtime system data. Approaches and tools have been proposed to automatically ...
Hui Song, Gang Huang, Yingfei Xiong, Franck Chauve...
DASIP
2010
13 years 3 months ago
GPU implementation of motion estimation for visual saliency
Visual attention is a complex concept that includes many processes to find the region of concentration in a visual scene. In this paper, we discuss a spatio-temporal visual salien...
Anis Rahman, Dominique Houzet, Denis Pellerin, Lio...
VRIPHYS
2010
13 years 2 months ago
Interactive Deformations with Multigrid Skeletal Constraints
In this paper we present an interactive method for simulating deformable objects using skeletal constraints. We introduce a two-way coupling of a finite element model and a skelet...
Joachim Georgii, Daniel Lagler, Christian Dick, R&...
INFOCOM
2005
IEEE
14 years 1 months ago
Bounding the power rate function of wireless ad hoc networks
Abstract— Given a wireless ad hoc network and an endto-end traffic pattern, the power rate function refers to the minimum total power required to support different throughput un...
Yunnan Wu, Qian Zhang, Wenwu Zhu, Sun-Yuan Kung