Sciweavers

5599 search results - page 1068 / 1120
» Abstract State Services
Sort
View
CANDC
2005
ACM
15 years 1 months ago
Freedom and constraint in the creative process in digital fine art: an AHRB invited workshop
The workshop will explore in depth the nature of freedom and constraint in the creative process in digital fine art from the perspective of embodied mind. The problem is crucial t...
John Haworth, Sue Gollifer, James Faure Walker, Pa...
ICDCS
2010
IEEE
15 years 1 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
COMPGEOM
2008
ACM
15 years 1 months ago
Maximum thick paths in static and dynamic environments
We consider the problem of finding a maximum number of disjoint paths for unit disks moving amidst static or dynamic obstacles. For the static case we give efficient exact algorit...
Esther M. Arkin, Joseph S. B. Mitchell, Valentin P...
COMPGEOM
2008
ACM
15 years 1 months ago
Towards persistence-based reconstruction in euclidean spaces
Manifold reconstruction has been extensively studied for the last decade or so, especially in two and three dimensions. Recent advances in higher dimensions have led to new method...
Frédéric Chazal, Steve Oudot
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
15 years 1 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
« Prev « First page 1068 / 1120 Last » Next »