Sciweavers

2340 search results - page 449 / 468
» Second quarter 2008
Sort
View
COMPGEOM
2008
ACM
13 years 10 months ago
Robust construction of the three-dimensional flow complex
The Delaunay triangulation and its dual the Voronoi diagram are ubiquitous geometric complexes. From a topological standpoint, the connection has recently been made between these ...
Frédéric Cazals, Aditya G. Parameswa...
CSCWD
2008
Springer
13 years 10 months ago
Development of a project level performance measurement model for improving collaborative design team work
This research explored a new direction of improving collaborative design by performance measurement. More specifically, a novel 3-dimensional performance measurement model is deve...
Yuanyuan Yin, Shengfeng Qin, Ray Holland
CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CVPR
2008
IEEE
13 years 10 months ago
Real-time global localization with a pre-built visual landmark database
In this paper, we study how to build a vision-based system for global localization with accuracies within 10cm. for robots and humans operating both indoors and outdoors over wide...
Zhiwei Zhu, Taragay Oskiper, Supun Samarasekera, R...
DAC
2008
ACM
13 years 10 months ago
Application mapping for chip multiprocessors
The problem attacked in this paper is one of automatically mapping an application onto a Network-on-Chip (NoC) based chip multiprocessor (CMP) architecture in a locality-aware fas...
Guangyu Chen, Feihui Li, Seung Woo Son, Mahmut T. ...