Sciweavers

1262 search results - page 206 / 253
» Generating instruction sets and microarchitectures from appl...
Sort
View
EUROCRYPT
2006
Springer
15 years 1 months ago
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
The Isomorphism of Polynomials (IP) [28], which is the main concern of this paper, originally corresponds to the problem of recovering the secret key of a C scheme [26]. Besides, t...
Jean-Charles Faugère, Ludovic Perret
SMA
1995
ACM
217views Solid Modeling» more  SMA 1995»
15 years 1 months ago
Bubble mesh: automated triangular meshing of non-manifold geometry by sphere packing
This paper presents a new computational method for fully automated triangular mesh generation, consistently applicable to wire-frame, surface, solid, and nonmanifold geometries. T...
Kenji Shimada, David C. Gossard
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
15 years 1 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
CDC
2008
IEEE
120views Control Systems» more  CDC 2008»
14 years 11 months ago
Left invertibility of discrete systems with finite inputs and quantized output
Abstract-- The aim of this paper is to address left invertibility for dynamical systems with inputs and outputs in discrete sets. We study systems that evolve in discrete time with...
Nevio Dubbini, Benedetto Piccoli, Antonio Bicchi
CCE
2007
14 years 11 months ago
Context-aware Integration of Collaboration Services for the Support of Mobile Field Operations
: This paper describes concepts for using contextual information in an advanced service environment for the support of mobile maintenance processes. We focus on spatio-temporal con...
Heinz-Josef Eikerling, Matthias Benesch, Frank Ber...