Sciweavers

848 search results - page 94 / 170
» Topology Control
Sort
View
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
14 years 8 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
CAD
2006
Springer
13 years 8 months ago
A unified subdivision approach for multi-dimensional non-manifold modeling
This paper presents a new unified subdivision scheme that is defined over a k-simplicial complex in n-D space with k 3. We first present a series of definitions to facilitate top...
Yu-Sung Chang, Hong Qin
CISS
2008
IEEE
14 years 2 months ago
Peer-to-Peer utility maximization
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...
JCST
2010
119views more  JCST 2010»
13 years 6 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
VRST
2004
ACM
14 years 1 months ago
FreeWalk/Q: social interaction platform in virtual space
We have integrated technologies related to virtual social interaction, e.g. virtual environments, visual simulations, and lifelike characters. In our previous efforts to integrate...
Hideyuki Nakanishi, Toru Ishida