Sciweavers

5451 search results - page 903 / 1091
» On very high degrees
Sort
View
SCIA
2005
Springer
186views Image Analysis» more  SCIA 2005»
14 years 3 months ago
Levelset and B-Spline Deformable Model Techniques for Image Segmentation: A Pragmatic Comparative Study
Deformable contours are now widely used in image segmentation, using different models, criteria and numeric schemes. Some theoretical comparisons between few deformable model met...
Diane Lingrand, Johan Montagnat
VSTTE
2005
Springer
14 years 3 months ago
Verifying Design with Proof Scores
: Verifying design instead of code can be an effective and practical approach to obtaining verified software. This paper argues that proof scores are an attractive method for ver...
Kokichi Futatsugi, Joseph A. Goguen, Kazuhiro Ogat...
WWIC
2005
Springer
197views Communications» more  WWIC 2005»
14 years 3 months ago
Reducing Memory Fragmentation with Performance-Optimized Dynamic Memory Allocators in Network Applications
The needs for run-time data storage in modern wired and wireless network applications are increasing. Additionally, the nature of these applications is very dynamic, resulting in ...
Stylianos Mamagkakis, Christos Baloukas, David Ati...
NETGAMES
2004
ACM
14 years 3 months ago
Lightweight QoS-support for networked mobile gaming
In this paper, we present an approach to provide Quality of Service (QoS) for networked mobile gaming. In order to examine the QoS requirements of mobile games, we ported a simple...
Marcel Busse, Bernd Lamparter, Martin Mauve, Wolfg...
EUROCRYPT
2004
Springer
14 years 3 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer