Sciweavers

1008 search results - page 81 / 202
» Canonicity!
Sort
View
162
Voted
ISDA
2006
IEEE
15 years 9 months ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu
SIGCSE
2005
ACM
123views Education» more  SIGCSE 2005»
15 years 9 months ago
Taming Java for the classroom
Java is the canonical language for teaching introductory programming, but its complex syntax and abundance of constructs are difficult for beginners to learn. This paper shows how...
James I. Hsia, Elspeth Simpson, Daniel Smith, Robe...
ISMIS
2005
Springer
15 years 9 months ago
Normal Forms for Knowledge Compilation
A class of formulas called factored negation normal form is introduced. They are closely related to BDDs, but there is a DPLL-like tableau procedure for computing them that operate...
Reiner Hähnle, Neil V. Murray, Erik Rosenthal
ISVC
2005
Springer
15 years 9 months ago
An Artistic Portrait Caricature Model
Abstract. We present a new model for artistic portrait caricature modeling and rendering. It is composed of a caricature model and a rendering system. The computer portrait caricat...
V. Boyer
COMPGEOM
2004
ACM
15 years 8 months ago
Extreme elevation on a 2-manifold
Given a smoothly embedded 2-manifold in ¤¦¥ , we define the elevation of a point as the height difference to a canonically defined second point on the same manifold. Our de...
Pankaj K. Agarwal, Herbert Edelsbrunner, John Hare...