Sciweavers

31 search results - page 6 / 7
» Binary Tree Encryption: Constructions and Applications
Sort
View
ERLANG
2003
ACM
14 years 23 days ago
A study of Erlang ETS table implementations and performance
The viability of implementing an in-memory database, Erlang ETS, using a relatively-new data structure, called a Judy array, was studied by comparing the performance of ETS tables...
Scott Lystig Fritchie
LICS
2003
IEEE
14 years 23 days ago
Polynomial-time Algorithms from Ineffective Proofs
We present a constructive procedure for extracting polynomial-time realizers from ineffective proofs of Π0 2theorems in feasible analysis. By ineffective proof we mean a proof wh...
Paulo Oliva
VVS
2000
IEEE
171views Visualization» more  VVS 2000»
13 years 12 months ago
Fast CSG voxelization by frame buffer pixel mapping
This paper describes a fast algorithm for the volume conversion and rendering of CSG models constructed from both geometric and volumetric primitives. Using 3D texture mapping and...
Shiaofen Fang, Duoduo Liao
SENSYS
2010
ACM
13 years 5 months ago
Estimating building consumption breakdowns using ON/OFF state sensing and incremental sub-meter deployment
This paper considers the problem of estimating the power breakdowns for the main appliances inside a building using a small number of power meters and the knowledge of the ON/OFF ...
Deokwoo Jung, Andreas Savvides
DATE
2008
IEEE
148views Hardware» more  DATE 2008»
14 years 1 months ago
On Analysis and Synthesis of (n, k)-Non-Linear Feedback Shift Registers
— Non-Linear Feedback Shift Registers (NLFSRs) have been proposed as an alternative to Linear Feedback Shift Registers (LFSRs) for generating pseudo-random sequences for stream c...
Elena Dubrova, Maxim Teslenko, Hannu Tenhunen