Search
Now showing items 891-900 of 939
High fidelity compression of irregularly sampled height fields
(2007)
This paper presents a method to compress irregularly sampled height-fields based on a multi-resolution framework. Unlike many other height-field compression techniques, no resampling is required so the original height-field ...
Attack analysis of cryptographic protocols using strand spaces
(2003)
Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security ...
Inclination of scholars to major in information systems or computer science
(2005)
This paper describes a survey of 497 final year scholars at schools in the Western Cape, South Africa. They were asked about their inclination to study information systems (IS) or computer science (CS), their knowledge of ...
A Balanced Approach to IT Project Management
(2007)
The primary objectives of this study were to identify how IT projects can be managed using the Balanced Scorecard approach. Although the research is positioned to have potential application within international project ...
Cabernet: A Content Delivery Network for Moving Vehicles
(2008-01-17)
This paper describes the design, implementation, and evaluation of Cabernet, a system to deliver data to and from moving vehicles using open 802.11 (WiFi) access points encountered opportunistically during travel. Network ...
Efficient Object Recognition and Image Retrieval for Large-Scale Applications
(2008-05-06)
Algorithms for recognition and retrieval tasks generally call for both speed and accuracy. When scaling up to very large applications, however, we encounter additional significant requirements: adaptability and scalability. ...
Understanding camera trade-offs through a Bayesian analysis of light field projections
(2008-04-16)
Computer vision has traditionally focused on extracting structure,such as depth, from images acquired using thin-lens or pinhole optics. The development of computational imaging is broadening this scope; a variety of ...
New-Age Cryptography
(2008-04-16)
We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract out concrete properties of a random oracle and are significantly stronger than traditional cryptographic hardness assumptions; ...
Random-World Semantics and Syntactic Independence for Expressive Languages
(2008-05-03)
We consider three desiderata for a language combining logic and probability: logical expressivity, random-world semantics, and the existence of a useful syntactic condition for probabilistic independence. Achieving these ...
Block Heavy Hitters
(2008-05-02)
e study a natural generalization of the heavy hitters problem in thestreaming context. We term this generalization *block heavy hitters* and define it as follows. We are to stream over a matrix$A$, and report all *rows* ...