Sciweavers

1147 search results - page 105 / 230
» Transformation of Access Rights
Sort
View
SIROCCO
1998
13 years 10 months ago
The counting pyramid: an adaptive distributed counting scheme
A distributed counter is a concurrent object which provides a fetch-and-increment operation on a shared value. On the basis of a distributed counter, one can implement various fun...
Roger Wattenhofer, Peter Widmayer
CN
2007
97views more  CN 2007»
13 years 8 months ago
Security enhancement of an IC-card-based remote login mechanism
Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand th...
Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang
IVC
2007
90views more  IVC 2007»
13 years 8 months ago
Which is the best way to organize/classify images by content?
Thousands of images are generated every day, which implies the necessity to classify, organise and access them using an easy, faster and efficient way. Scene classification, the ...
Anna Bosch, Xavier Muñoz, Robert Marti
CG
2004
Springer
13 years 8 months ago
Compression of soft-body animation sequences
We describe a compression scheme for the geometry component of 3D animation sequences. This scheme is based on the principle component analysis (PCA) method, which represents the ...
Zachi Karni, Craig Gotsman
CN
1999
98views more  CN 1999»
13 years 8 months ago
Managing application level quality of service through TOMTEN
With the growth of mobile computing, users will have simultaneous access to multiple overlaid networks, each with Zdifferent characteristics, services and costs. This paper introd...
R. De Silva, Björn Landfeldt, Sebastien Ardon...