Sciweavers

3786 search results - page 696 / 758
» Structure Comparison and Structure Patterns
Sort
View
ICRA
2005
IEEE
130views Robotics» more  ICRA 2005»
15 years 3 months ago
Effective Constrained Dynamic Simulation Using Implicit Constraint Enforcement
- Stable and effective enforcement of hard constraints is one of the crucial components in controlling physics-based dynamic simulation systems. The conventional explicit Baumgarte...
Min Hong, Min-Hyung Choi, Sunhwa Jung, Samuel W. J...
ISPD
2005
ACM
188views Hardware» more  ISPD 2005»
15 years 3 months ago
A semi-persistent clustering technique for VLSI circuit placement
Placement is a critical component of today's physical synthesis flow with tremendous impact on the final performance of VLSI designs. However, it accounts for a significant p...
Charles J. Alpert, Andrew B. Kahng, Gi-Joon Nam, S...
CCS
2005
ACM
15 years 3 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
CHI
2004
ACM
15 years 3 months ago
Topobo: a constructive assembly system with kinetic memory
We introduce Topobo, a 3D constructive assembly system embedded with kinetic memory, the ability to record and playback physical motion. Unique among modeling systems is Topoboʼs...
Hayes Raffle, Amanda J. Parkes, Hiroshi Ishii
DIALM
2004
ACM
124views Algorithms» more  DIALM 2004»
15 years 3 months ago
Localized techniques for broadcasting in wireless sensor networks
We present three localized techniques for broadcasting in large scale ad hoc networks, i.e., for the problem of disseminating a message from a source node to all the nodes in the ...
Lorenzo Orecchia, Alessandro Panconesi, Chiara Pet...