Sciweavers

473 search results - page 72 / 95
» Behavioural Models for Hierarchical Components
Sort
View
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 5 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
COMPGEOM
2004
ACM
15 years 5 months ago
Approximate convex decomposition of polygons
We propose a strategy to decompose a polygon, containing zero or more holes, into “approximately convex” pieces. For many applications, the approximately convex components of ...
Jyh-Ming Lien, Nancy M. Amato
SAINT
2002
IEEE
15 years 4 months ago
The Internet Enterprise
In this paper we present our vision of the Internet Enterprise: a highly interoperable, virtual enterprise infrastructure for individuals, small businesses, and large corporations...
Abdelsalam Helal, Stanley Y. W. Su, Jie Meng, Raja...
WSC
2001
15 years 1 months ago
An object-oriented paradigm for simulating postal distribution centers
Discrete-event simulation is an established tool for the design and management of large-scale mail sortation and distribution systems. Because the design of distribution facilitie...
K. Preston White, Brian Barney, Scott Keller, Robe...
CVGIP
2007
88views more  CVGIP 2007»
14 years 11 months ago
Autonomous pedestrians
We address the difficult open problem of emulating the rich complexity of real pedestrians in urban environments. Our artificial life approach integrates motor, perceptual, beha...
Wei Shao, Demetri Terzopoulos