Sciweavers

988 search results - page 38 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
MOC
1998
147views more  MOC 1998»
13 years 8 months ago
On the Diophantine equation |axn - byn | = 1
If a, b and n are positive integers with b ≥ a and n ≥ 3, then the equation of the title possesses at most one solution in positive integers x and y, with the possible exceptio...
Michael A. Bennett, Benjamin M. M. de Weger
INFOCOM
2003
IEEE
14 years 2 months ago
Server-based Inference of Internet Link Lossiness
— We investigate the problem of inferring the packet loss characteristics of Internet links using server-based measurements. Unlike much of existing work on network tomography th...
Venkata N. Padmanabhan, Lili Qiu, Helen J. Wang
PERCOM
2003
ACM
14 years 8 months ago
Using Personnel Movements for Indoor Autonomous Environment Discovery
We present a novel method of extracting topological and metric geographical data using only positional data sensed from personnel movements. We extend research from the field of r...
Robert K. Harle, Andy Hopper
LOGCOM
2010
123views more  LOGCOM 2010»
13 years 7 months ago
The Hyper Tableaux Calculus with Equality and an Application to Finite Model Computation
In most theorem proving applications, a proper treatment of equational theories or equality is mandatory. In this paper we show how to integrate a modern treatment of equality in ...
Peter Baumgartner, Ulrich Furbach, Björn Pelz...
UIST
1998
ACM
14 years 1 months ago
Path Drawing for 3D Walkthrough
This paper presents an interaction technique for walkthrough in virtual 3D spaces, where the user draws the intended path directly on the scene, and the avatar automatically moves...
Takeo Igarashi, Rieko Kadobayashi, Kenji Mase, Hid...