Sciweavers

1863 search results - page 308 / 373
» Unifying Theories of Objects
Sort
View
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 1 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
HAPTICS
2005
IEEE
14 years 1 months ago
Selective Stimulation to Superficial Mechanoreceptors by Temporal Control of Suction Pressure
In this paper we propose a new set of primitives to realize a large-area covering realistic tactile display. They stimulate the skin surface with suction pressure (SPS method) as ...
Yasutoshi Makino, Hiroyuki Shinoda
ICMCS
2005
IEEE
75views Multimedia» more  ICMCS 2005»
14 years 1 months ago
The sound wave ray-space
This paper addresses the problem of 3D sound representation without sound source localization and proposes a theory based on the ray-space representation of light rays, which is i...
Mehrdad Panahpour Tehrani, Yasushi Hirano, Toshiak...
TRIDENTCOM
2005
IEEE
14 years 1 months ago
A Geography-Aware Scalable Community Wireless Network Test Bed
Wireless mesh networks have increasingly become an object of interest in recent years as a strong alternative to purely wired infrastructure networks and purely mobile wireless ne...
Bow-Nan Cheng, Shivkumar Kalyanaraman, Max Klein
SMA
2005
ACM
109views Solid Modeling» more  SMA 2005»
14 years 1 months ago
Numerical decomposition of geometric constraints
Geometric constraint solving is a key issue in CAD/CAM. Since Owen’s seminal paper, solvers typically use graph based decomposition methods. However, these methods become diffi...
Sebti Foufou, Dominique Michelucci, Jean-Paul Jurz...