Sciweavers

933 search results - page 149 / 187
» Fully automatic cross-associations
Sort
View
IJISEC
2007
87views more  IJISEC 2007»
14 years 11 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
SMA
2008
ACM
286views Solid Modeling» more  SMA 2008»
14 years 11 months ago
Controlled field generation for quad-remeshing
Quadrangular remeshing of triangulated surfaces has received an increasing attention in recent years. A particularly elegant approach is the extraction of quads from the streamlin...
Oliver Schall, Rhaleb Zayer, Hans-Peter Seidel
BMCBI
2005
150views more  BMCBI 2005»
14 years 11 months ago
Approaching the taxonomic affiliation of unidentified sequences in public databases - an example from the mycorrhizal fungi
Background: During the last few years, DNA sequence analysis has become one of the primary means of taxonomic identification of species, particularly so for species that are minut...
R. Henrik Nilsson, Erik Kristiansson, Martin Ryber...
TVCG
2008
111views more  TVCG 2008»
14 years 11 months ago
Two-Way Coupled SPH and Particle Level Set Fluid Simulation
Grid-based methods have difficulty resolving features on or below the scale of the underlying grid. Although adaptive methods (e.g., RLE, octrees) can alleviate this to some degree...
Frank Losasso, Jerry O. Talton, Nipun Kwatra, Rona...
JSS
2007
169views more  JSS 2007»
14 years 11 months ago
MDABench: Customized benchmark generation using MDA
This paper describes an approach for generating customized benchmark suites from a software architecture description following a Model Driven Architecture (MDA) approach. The benc...
Liming Zhu, Ngoc Bao Bui, Yan Liu, Ian Gorton