Sciweavers

1083 search results - page 214 / 217
» The limits of localization using RSS
Sort
View
TC
2008
13 years 7 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
TPDS
2008
175views more  TPDS 2008»
13 years 7 months ago
Centralized versus Distributed Schedulers for Bag-of-Tasks Applications
Multiple applications that execute concurrently on heterogeneous platforms compete for CPU and network resources. In this paper, we consider the problem of scheduling applications ...
Olivier Beaumont, Larry Carter, Jeanne Ferrante, A...
TVCG
2008
133views more  TVCG 2008»
13 years 7 months ago
Texture-based Transfer Functions for Direct Volume Rendering
Visualization of volumetric data faces the difficult task of finding effective parameters for the transfer functions. Those parameters can determine the effectiveness and accuracy ...
Jesus Caban, Penny Rheingans
IJCV
2000
141views more  IJCV 2000»
13 years 7 months ago
Reliable Estimation of Dense Optical Flow Fields with Large Displacements
In this paper we show that a classic optical ow technique by Nagel and Enkelmann (1986) can be regarded as an early anisotropic di usion method with a di usion tensor. We introduc...
Luis Álvarez, Joachim Weickert, Javier S&aa...
PE
2002
Springer
158views Optimization» more  PE 2002»
13 years 7 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...