Sciweavers

2126 search results - page 348 / 426
» An optimization algorithm for imprecise multi-objective prob...
Sort
View
132
Voted
INFOCOM
2008
IEEE
15 years 9 months ago
Adding Capacity Points to a Wireless Mesh Network Using Local Search
Abstract— Wireless mesh network deployments are popular as a cost-effective means to provide broadband connectivity to large user populations. As the network usage grows, network...
Joshua Robinson, Mustafa Uysal, Ram Swaminathan, E...
107
Voted
ICPR
2004
IEEE
16 years 3 months ago
Shape Metamorphism using p-Laplacian Equation
We present a new approach for shape metamorphism, which is a process of gradually changing a source shape (known) through intermediate shapes (unknown) into a target shape (known)...
Bahram Parvin, Ge Cong, George Bebis, Mehmet Esser
139
Voted
DAC
2002
ACM
16 years 3 months ago
Software synthesis from synchronous specifications using logic simulation techniques
This paper addresses the problem of automatic generation of implementation software from high-level functional specifications in the context of embedded system on chip designs. So...
Yunjian Jiang, Robert K. Brayton
146
Voted
SGP
2007
15 years 5 months ago
Voronoi-based variational reconstruction of unoriented point sets
We introduce an algorithm for reconstructing watertight surfaces from unoriented point sets. Using the Voronoi diagram of the input point set, we deduce a tensor field whose princ...
Pierre Alliez, David Cohen-Steiner, Yiying Tong, M...
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
15 years 4 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin