Sciweavers

8496 search results - page 1672 / 1700
» Problem Solving and Complex Systems
Sort
View
SPAA
2010
ACM
14 years 17 days ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
EUROCRYPT
2010
Springer
14 years 16 days ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
GIS
1999
ACM
14 years 18 hour ago
Animated Cartography for Urban Soundscape Information
In urban areas, city noises represent today a great problem. They are real nuisances for city-dwellers. Noises are caused by traffic, road works, factories, and also by people. So...
Myoung-Ah Kang, Sylvie Servigne
SIGGRAPH
1998
ACM
13 years 12 months ago
Realistic Modeling and Rendering of Plant Ecosystems
Modeling and rendering of natural scenes with thousands of plants poses a number of problems. The terrain must be modeled and plants must be distributed throughout it in a realist...
Oliver Deussen, Pat Hanrahan, Bernd Lintermann, Ra...
IGIS
1994
118views GIS» more  IGIS 1994»
13 years 12 months ago
Surface Modelling with Guaranteed Consistency - An Object-Based Approach
There have been many interpolation methods developed over the years, each with their own problems. One of the biggest limitations in many applications is the non-correspondence of...
Christopher M. Gold, Thomas Roos
« Prev « First page 1672 / 1700 Last » Next »