—Search engine companies collect the “database of intentions”, the histories of their users’ search queries. These search logs are a gold mine for researchers. Search engin...
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
—We propose an efficient alternative to commonly used parametric surfaces such as NURBS surfaces for definition of complex geometry in shared virtual spaces. Our mathematical mod...
C code implementation of several math algorithms such as Linear Algebraic Equations,
Interpolation and Extrapolation, Integration of Functions, Evaluation of Functions, Random Num...
William H. Press, Saul A. Teukolsky, William T. Ve...
We report new techniques and theory in computational topology for reconstructing surfaces with boundary. This complements and extends known techniques for surfaces without boundar...
K. Abe, Justin Bisceglio, Thomas J. Peters, Alexan...