Sciweavers

5891 search results - page 1132 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
VRCAI
2006
ACM
15 years 10 months ago
Parallel-split shadow maps for large-scale virtual environments
Shadowing effects dramatically enhance the realism of virtual environments by providing useful visual cues. Shadow mapping is an efficient algorithm for real-time shadow renderin...
Fan Zhang, Hanqiu Sun, Leilei Xu, Lee Kit Lun
ICDCSW
2005
IEEE
15 years 10 months ago
Control Theory Optimization of MECN in Satellite Networks
Congestion in the Internet results in wasted bandwidth and also stands in the way of guaranteeing QoS. The effect of congestion is multiplied many fold in Satellite networks, wher...
Arjan Durresi, Mukundan Sridharan, Sriram Chellapp...
GECCO
2005
Springer
232views Optimization» more  GECCO 2005»
15 years 10 months ago
A hardware pipeline for function optimization using genetic algorithms
Genetic Algorithms (GAs) are very commonly used as function optimizers, basically due to their search capability. A number of different serial and parallel versions of GA exist. ...
Malay Kumar Pakhira, Rajat K. De
SENSYS
2004
ACM
15 years 10 months ago
Synopsis diffusion for robust aggregation in sensor networks
Previous approaches for computing duplicate-sensitive aggregates in sensor networks (e.g., in TAG) have used a tree topology, in order to conserve energy and to avoid double-count...
Suman Nath, Phillip B. Gibbons, Srinivasan Seshan,...
MDM
2004
Springer
15 years 9 months ago
Processing Range-Monitoring Queries on Heterogeneous Mobile Objects
We consider in this paper how to leverage heterogeneous mobile computing capability for efficient processing of real-time range-monitoring queries. In our environment, each mobil...
Ying Cai, Kien A. Hua, Guohong Cao
« Prev « First page 1132 / 1179 Last » Next »