Sciweavers

4850 search results - page 919 / 970
» Proof and Computation in Geometry
Sort
View
104
Voted
TOG
2012
258views Communications» more  TOG 2012»
13 years 1 months ago
Stitch meshes for modeling knitted clothing with yarn-level detail
ike abstraction of the yarn model; (c) then, we specify the desired knitting pattern over the stitch mesh’s surface. (d) Following the interactive modeling process, the model goe...
Cem Yuksel, Jonathan M. Kaldor, Doug L. James, Ste...
124
Voted
TOG
2012
271views Communications» more  TOG 2012»
13 years 1 months ago
Mass splitting for jitter-free parallel rigid body simulation
We present a parallel iterative rigid body solver that avoids common artifacts at low iteration counts. In large or real-time simulations, iteration is often terminated before con...
Richard Tonge, Feodor Benevolenski, Andrey Voroshi...
PODC
2009
ACM
15 years 11 months ago
Oblivious interference scheduling
In the interference scheduling problem, one is given a set of n communication requests described by pairs of points from a metric space. The points correspond to devices in a wire...
Alexander Fanghänel, Berthold Vöcking, H...
TCC
2009
Springer
142views Cryptology» more  TCC 2009»
15 years 11 months ago
Chosen-Ciphertext Security via Correlated Products
We initiate the study of one-wayness under correlated products. We are interested in identifying necessary and sufficient conditions for a function f and a distribution on inputs ...
Alon Rosen, Gil Segev
STOC
2006
ACM
130views Algorithms» more  STOC 2006»
15 years 11 months ago
On the fourier tails of bounded functions over the discrete cube
In this paper we consider bounded real-valued functions over the discrete cube, f : {-1, 1}n [-1, 1]. Such functions arise naturally in theoretical computer science, combinatorics...
Irit Dinur, Ehud Friedgut, Guy Kindler, Ryan O'Don...