Sciweavers

674 search results - page 102 / 135
» Telephony in the Year 2005
Sort
View
CGF
2005
78views more  CGF 2005»
13 years 10 months ago
Visual Supercomputing: Technologies, Applications and Challenges
If we were to have a Grid infrastructure for visualization, what technologies would be needed to build such an infrastructure, what kind of applications would benefit from it, and...
Ken Brodlie, John Brooke, Min Chen, David Chisnall...
CGF
2005
84views more  CGF 2005»
13 years 10 months ago
Perceptual Evaluation of Impostor Representations for Virtual Humans and Buildings
In large-scale simulations involving complex scenes, such as cities inhabited by crowds, simplifications are almost always necessary to achieve interactive frame-rates. Level of D...
John Hamill, Rachel McDonnell, Simon Dobbyn, Carol...
IJIEM
2010
171views more  IJIEM 2010»
13 years 8 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
INDOCRYPT
2010
Springer
13 years 8 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
NAACL
2010
13 years 8 months ago
Extracting Parallel Sentences from Comparable Corpora using Document Level Alignment
The quality of a statistical machine translation (SMT) system is heavily dependent upon the amount of parallel sentences used in training. In recent years, there have been several...
Jason R. Smith, Chris Quirk, Kristina Toutanova