Sciweavers

1566 search results - page 82 / 314
» Contification Using Dominators
Sort
View
WSC
2004
14 years 11 months ago
A BGP Attack Against Traffic Engineering
As the Internet grows, traffic engineering has become a widely-used technique to control the flow of packets. For the inter-domain routing, traffic engineering relies on configura...
Jintae Kim, Steven Y. Ko, David M. Nicol, Xenofont...
ISMB
1994
14 years 11 months ago
Genetic Map Construction with Constraints
Apilot program,CME,is describedfor generatinga physical genetic mapfromhybridization fingerprintingdata. CMEis implementedin the parallel constraint logic programming language Eli...
Dominic A. Clark, Christopher J. Rawlings, Sylvie ...
GRC
2008
IEEE
14 years 11 months ago
Fuzzy Preference Relation Rough Sets
Preference analysis is a class of important tasks in multi-criteria decision making. The classical rough set theory was generalized to deal with preference analysis by replacing e...
Qinghua Hu, Daren Yu, Congxin Wu
CGF
2008
83views more  CGF 2008»
14 years 10 months ago
Shallow Bounding Volume Hierarchies for Fast SIMD Ray Tracing of Incoherent Rays
Photorealistic image synthesis is a computationally demanding task that relies on ray tracing for the evaluation of integrals. Rendering time is dominated by tracing long paths th...
Holger Dammertz, Johannes Hanika, Alexander Keller
CORR
2006
Springer
182views Education» more  CORR 2006»
14 years 9 months ago
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Joan-Josep Climent, E. Gorla, J. Rosenthal