Sciweavers

1053 search results - page 28 / 211
» On k-Path Covers and their applications
Sort
View
IICS
2010
Springer
14 years 22 days ago
Using Digital Images to spread Executable Code on Internet
. Steganography is defined as covered writing and it has been used to achieve confidentiality. Most of research in this domain has focused in just sending plain data. In this paper...
Roberto Gómez, Gabriel Ramírez
IPCO
2001
117views Optimization» more  IPCO 2001»
13 years 10 months ago
Pruning by Isomorphism in Branch-and-Cut
The paper presents a branch-and-cut for solving (0, 1) integer linear programs having a large symmetry group. The group is used for pruning the enumeration tree and for generating ...
François Margot
ENTCS
2008
81views more  ENTCS 2008»
13 years 9 months ago
Presenting Dcpos and Dcpo Algebras
Dcpos can be presented by a preorder of generators and inequational relations expressed as covers. Algebraic operations on the generators (possibly with their results being ideals...
Achim Jung, M. Andrew Moshier, Steven J. Vickers
PATMOS
2004
Springer
14 years 2 months ago
Application Analysis with Integrated Identification of Complex Instructions for Configurable Processors
Abstract. An extensible and configurable processor is a programmable platform offering the possibility to customize the instruction set and/or underlying microarchitecture. Efficie...
Nikolaos Kavvadias, Spiridon Nikolaidis
AUIC
2003
IEEE
14 years 2 months ago
Location based Applications for Mobile Augmented Reality
In this work we investigate building indoor location based applications for a mobile augmented reality system. We believe that augmented reality is a natural interface to visualiz...
Gerhard Reitmayr, Dieter Schmalstieg