Sciweavers

6575 search results - page 964 / 1315
» Specializing visualization algorithms
Sort
View
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
15 years 9 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
105
Voted
ATAL
2007
Springer
15 years 9 months ago
Enacting protocols by commitment concession
Commitment protocols formalize interactions among autonomous, heterogeneous agents, leaving the agents’ local policies unspecified. This paper studies the problem of agents ena...
Pinar Yolum, Munindar P. Singh
ESA
2007
Springer
101views Algorithms» more  ESA 2007»
15 years 9 months ago
Linear Data Structures for Fast Ray-Shooting Amidst Convex Polyhedra
We consider the problem of ray shooting in a three-dimensional scene consisting of k (possibly intersecting) convex polyhedra with a total of n facets. That is, we want to preproc...
Haim Kaplan, Natan Rubin, Micha Sharir
100
Voted
EUROCAST
2007
Springer
126views Hardware» more  EUROCAST 2007»
15 years 9 months ago
Determining Orbital Elements of Extrasolar Planets by Evolution Strategies
After the detection of the first extrasolar planet (exoplanet) more than one decade ago we currently know about more than 200 planets around other stars and there are about twenty...
Andreas M. Chwatal, Günther R. Raidl
145
Voted
FPGA
2007
ACM
185views FPGA» more  FPGA 2007»
15 years 9 months ago
Power-aware FPGA logic synthesis using binary decision diagrams
Power consumption in field programmable gate arrays (FPGAs) has become an important issue as the FPGA market has grown to include mobile platforms. In this work we present a power...
Kevin Oo Tinmaung, David Howland, Russell Tessier