Sciweavers

2008 search results - page 197 / 402
» Computing with Equations
Sort
View
139
Voted
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 6 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
119
Voted
SMA
2009
ACM
125views Solid Modeling» more  SMA 2009»
15 years 9 months ago
Stable mesh decimation
Current mesh reduction techniques, while numerous, all primarily reduce mesh size by successive element deletion (e.g. edge collapses) with the goal of geometric and topological f...
Chandrajit L. Bajaj, Andrew Gillette, Qin Zhang
121
Voted
INFOCOM
1994
IEEE
15 years 6 months ago
Traffic Models for Wireless Communication Networks
In this paper, we introduce a deterministic fluid model and two stochastic traffic models for wireless networks. The setting is a highway with multiple entrances and exits. Vehicl...
Kin K. Leung, William A. Massey, Ward Whitt
104
Voted
APPT
2005
Springer
15 years 4 months ago
Experiments on Asynchronous Partial Gauss-Seidel Method
This paper presents design and experimental results of a parallel linear equation solver by asynchronous partial Gauss-Seidel method. The basic idea of this method is derived from ...
Hiroshi Nishida, Hairong Kuang
120
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
Evaluation of the Probability of K-Hop Connection in Homogeneous Wireless Sensor Networks
— Given a wireless sensor network (WSN) whose sensors are randomly and independently distributed in a bounded area following a homogeneous Poisson process with density ρ and eac...
Xiaoyuan Ta, Guoqiang Mao, Brian D. O. Anderson