Sciweavers

3238 search results - page 403 / 648
» Not Enough Points Is Enough
Sort
View
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 4 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
RTA
1995
Springer
15 years 4 months ago
Completion for Multiple Reduction Orderings
We present a completion procedure (called MKB) that works for multiple reduction orderings. Given equations and a set of reduction orderings, the procedure simulates a computation ...
Masahito Kurihara, Hisashi Kondo, Azuma Ohuchi
SIGGRAPH
1995
ACM
15 years 4 months ago
Feature-based control of visibility error: a multi-resolution clustering algorithm for global illumination
In this paper we introduce a new approach to controlling error in hierarchical clustering algorithms for radiosity. The new method ensures that just enough work is done to meet th...
François X. Sillion, George Drettakis
SMA
1995
ACM
176views Solid Modeling» more  SMA 1995»
15 years 4 months ago
Incremental algorithms for collision detection between solid models
: Fast and accurate collision detection between general solid models is a fundamental problem in solid modeling, robotics, animation and computer-simulated environments. Most of th...
Madhav K. Ponamgi, Dinesh Manocha, Ming C. Lin
95
Voted
PARLE
1991
15 years 4 months ago
FORK: A High-Level Language for PRAMs
We present a new programming language designed to allow the convenient expression of algorithms for a parallel random access machine (PRAM). The language attempts to satisfy two p...
Torben Hagerup, Arno Schmitt, Helmut Seidl