Sciweavers

329 search results - page 66 / 66
» Setting up Exhausted Values
Sort
View
COCO
2007
Springer
88views Algorithms» more  COCO 2007»
15 years 3 months ago
A New Interactive Hashing Theorem
Interactive hashing, introduced by Naor, Ostrovsky, Venkatesan and Yung (CRYPTO ’92), plays an important role in many cryptographic protocols. In particular, it is a major compo...
Iftach Haitner, Omer Reingold
SAFECOMP
1998
Springer
15 years 1 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
TOG
2008
122views more  TOG 2008»
14 years 9 months ago
Time-resolved 3d capture of non-stationary gas flows
Fluid simulation is one of the most active research areas in computer graphics. However, it remains difficult to obtain measurements of real fluid flows for validation of the simu...
Bradley Atcheson, Ivo Ihrke, Wolfgang Heidrich, Ar...
SC
2004
ACM
15 years 3 months ago
A Performance and Scalability Analysis of the BlueGene/L Architecture
This paper is structured as follows. Section 2 gives an architectural description of BlueGene/L. Section 3 analyzes the issue of “computational noise” – the effect that the o...
Kei Davis, Adolfy Hoisie, Greg Johnson, Darren J. ...