Sciweavers

1382 search results - page 115 / 277
» Procedural Generation of Roads
Sort
View
FSE
1997
Springer
246views Cryptology» more  FSE 1997»
15 years 1 months ago
Fast Message Authentication Using Efficient Polynomial Evaluation
Abstract. Message authentication codes (MACs) using polynomial evaluation have the advantage of requiring a very short key even for very large messages. We describe a low complexit...
Valentine Afanassiev, Christian Gehrmann, Ben J. M...
CG
2006
Springer
15 years 1 days ago
Optimization of a Billiard Player - Tactical Play
In this paper we explore the tactical aspects needed for the creation of an intelligent computer-pool player. The research results in three modifications to our previous model. An ...
Jean-Pierre Dussault, Jean-François Landry
NIPS
2004
14 years 11 months ago
Bayesian Regularization and Nonnegative Deconvolution for Time Delay Estimation
Bayesian Regularization and Nonnegative Deconvolution (BRAND) is proposed for estimating time delays of acoustic signals in reverberant environments. Sparsity of the nonnegative f...
Yuanqing Lin, Daniel D. Lee
COLING
2000
14 years 11 months ago
Chart-Based Transfer Rule Application in Machine Translation
35"ansfer-based Machine Translation systems require a procedure for choosing the set; of transfer rules for generating a target language translation from a given source langu...
Adam Meyers, Michiko Kosaka, Ralph Grishman
FTCS
1998
84views more  FTCS 1998»
14 years 11 months ago
On the Use of Formal Techniques for Validation
The traditional use of formal methods has been for the veri cation of algorithms or protocols. Given the high cost and limitations in state space coverage provided by conventional...
Neeraj Suri, Purnendu Sinha