Sciweavers

320 search results - page 14 / 64
» Exponential shadow maps
Sort
View
IPPS
1999
IEEE
15 years 1 months ago
FPGA Implementation of Modular Exponentiation
An e cient implementations of the main building block in the RSA cryptographic scheme is achieved by mapping a bit-level systolic array for modular exponentiation onto Xilinx FPGAs...
Alexander Tiountchik, Elena Trichina
ICISC
2004
112views Cryptology» more  ICISC 2004»
14 years 11 months ago
Improvement on Ha-Moon Randomized Exponentiation Algorithm
Randomized recoding on the exponent of an exponentiation computation into a signed-digit representation has been a well known countermeasure against some side-channel attacks. Howe...
Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, Jae...
ICWSM
2010
14 years 11 months ago
Conversational Shadows: Describing Live Media Events Using Short Messages
Microblogging concurrently with live media events is becoming commonplace. The resulting comment stream represents a parallel, social conversational reflection on the event. Altho...
David A. Shamma, Lyndon Kennedy, Elizabeth F. Chur...
ICC
2009
IEEE
14 years 7 months ago
Interference and Deployment Issues for Cognitive Radio Systems in Shadowing Environments
In this paper we describe a model for calculating the aggregate interference encountered by primary receivers in the presence of randomly placed cognitive radios (CRs). We show tha...
Muhammad Fainan Hanif, Mansoor Shafi, Peter J. Smi...
76
Voted
CGF
2010
104views more  CGF 2010»
14 years 9 months ago
Interactive, Multiresolution Image-Space Rendering for Dynamic Area Lighting
Area lights add tremendous realism, but rendering them interactively proves challenging. Integrating visibility is costly, even with current shadowing techniques, and existing met...
Greg Nichols, Rajeev Penmatsa, Chris Wyman