Sciweavers

1390 search results - page 147 / 278
» Streaming Algorithms Measured in Terms of the Computed Quant...
Sort
View
DAC
2009
ACM
14 years 3 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
ICC
2007
IEEE
14 years 3 months ago
Towards Sender-Based TFRC
—Pervasive communications are increasingly sent over mobile devices and personal digital assistants. This trend has been observed during the last football world cup where cellula...
Guillaume Jourjon, Emmanuel Lochin, Patrick S&eacu...
ACMACE
2005
ACM
14 years 2 months ago
Achieving fairness in multiplayer network games through automated latency balancing
Over the past few years, the prominence of multiplayer network gaming has increased dramatically in the Internet. The effect of network delay (lag) on multiplayer network gaming h...
Sebastian Zander, Ian Leeder, Grenville J. Armitag...
CCS
2008
ACM
13 years 11 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
VIS
2004
IEEE
143views Visualization» more  VIS 2004»
14 years 10 months ago
Rough Interface Reconstruction Using the Level Set Method
We present a new level set method for reconstructing interfaces from point aggregations. Although level-set-based methods are advantageous because they can handle complicated topo...
David Thompson, Raghu Machiraju, Yootai Kim