Sciweavers

310 search results - page 29 / 62
» Why Delannoy numbers
Sort
View
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
14 years 4 months ago
Non-traditional irregular interconnects for massive scale SoC
— By using self-assembling fabrication techniques at the cellular, molecular, or atomic scale, it is nowadays possible to create functional assemblies in a mainly bottom-up way t...
Christof Teuscher, Anders A. Hansson
ADHOCNOW
2008
Springer
14 years 4 months ago
Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes
In this paper an innovative simulation study of five IEEE 802.11e network configurations is presented. The conducted analysis is crucial for understanding how a theoretically simpl...
Katarzyna Kosek, Marek Natkaniec, Andrzej R. Pach
CSFW
2007
IEEE
14 years 4 months ago
The Insecurity Problem: Tackling Unbounded Data
In this paper we focus on tackling the insecurity problem of security protocols in the presence of an unbounded number of data such as nonces or session keys. First, we pinpoint f...
Sibylle B. Fröschle
RT
2001
Springer
14 years 2 months ago
Measuring the Perception of Visual Realism in Images
One of the main goals in realistic rendering is to generate images that are indistinguishable from photographs – but how do observers decide whether an image is photographic or c...
Paul Rademacher, Jed Lengyel, Edward Cutrell, Turn...
LCR
2000
Springer
186views System Software» more  LCR 2000»
14 years 1 months ago
Adaptive Parallelism for OpenMP Task Parallel Programs
Abstract. We present a system that allows task parallel OpenMP programs to execute on a network of workstations (NOW) with a variable number of nodes. Such adaptivity, generally ca...
Alex Scherer, Thomas R. Gross, Willy Zwaenepoel