Sciweavers

7200 search results - page 1222 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
TKDE
2008
111views more  TKDE 2008»
13 years 10 months ago
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth)...
Francesc Sebé, Josep Domingo-Ferrer, Antoni...
JCP
2007
122views more  JCP 2007»
13 years 10 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
TPDS
2008
96views more  TPDS 2008»
13 years 10 months ago
Stochastic Graph Processes for Performance Evaluation of Content Delivery Applications in Overlay Networks
This paper proposes a new methodology to model the distribution of finite size content to a group of users connected through an overlay network. Our methodology describes the distr...
Damiano Carra, Renato Lo Cigno, Ernst W. Biersack
CGF
2005
170views more  CGF 2005»
13 years 10 months ago
Structure Recovery via Hybrid Variational Surface Approximation
Aiming at robust surface structure recovery, we extend the powerful optimization technique of variational shape approximation by allowing for several different primitives to repre...
Jianhua Wu, Leif Kobbelt
CGF
2005
159views more  CGF 2005»
13 years 10 months ago
Real-Time Shape Editing using Radial Basis Functions
Current surface-based methods for interactive freeform editing of high resolution 3D models are very powerful, but at the same time require a certain minimum tessellation or sampl...
Mario Botsch, Leif Kobbelt
« Prev « First page 1222 / 1440 Last » Next »