Sciweavers

1266 search results - page 233 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
TOG
2008
174views more  TOG 2008»
13 years 7 months ago
Real-time smoke rendering using compensated ray marching
We present a real-time algorithm called compensated ray marching for rendering of smoke under dynamic low-frequency environment lighting. Our approach is based on a decomposition ...
Kun Zhou, Zhong Ren, Stephen Lin, Hujun Bao, Baini...
CHI
2004
ACM
14 years 7 months ago
A commonsense approach to predictive text entry
People cannot type as fast as they think, especially when faced with the constraints of mobile devices. There have been numerous approaches to solving this problem, including rese...
Tom Stocky, Alexander Faaborg, Henry Lieberman
ECBS
2008
IEEE
113views Hardware» more  ECBS 2008»
13 years 7 months ago
Towards Secure Mobile Payment Based on SIP
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile pa...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
CCR
2004
116views more  CCR 2004»
13 years 7 months ago
End-to-end congestion control for TCP-friendly flows with variable packet size
Current TCP-friendly congestion control mechanisms adjust the packet rate in order to adapt to network conditions and obtain a throughput not exceeding that of a TCP connection op...
Jörg Widmer, Catherine Boutremans, Jean-Yves ...
TNN
2010
227views Management» more  TNN 2010»
13 years 2 months ago
Self-Organizing MultiLayer Perceptron
Abstract--A set of Artificial Neural Network (ANN) based methods for the design of an effective system of speech recognition of numerals of Assamese language captured under varied ...
B. Gas