Sciweavers

650 search results - page 25 / 130
» Distorting symmetric designs
Sort
View
TVCG
2010
147views more  TVCG 2010»
13 years 7 months ago
Superquadric Glyphs for Symmetric Second-Order Tensors
—Symmetric second-order tensor fields play a central role in scientific and biomedical studies as well as in image analysis and feature-extraction methods. The utility of displ...
Thomas Schultz, Gordon L. Kindlmann
WWW
2006
ACM
14 years 9 months ago
Symmetrically exploiting XML
Path expressions are the principal means of locating data in a hierarchical model. But path expressions are brittle because they often depend on the structure of data and break if...
Shuohao Zhang, Curtis E. Dyreson
CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 8 months ago
MINRES-QLP: a Krylov subspace method for indefinite or singular symmetric systems
Abstract. CG, SYMMLQ, and MINRES are Krylov subspace methods for solving large symmetric systems of linear equations. CG (the conjugate-gradient method) is reliable on positive-def...
Sou-Cheng T. Choi, Christopher C. Paige, Michael A...
IPPS
2006
IEEE
14 years 2 months ago
Self-stabilizing distributed algorithms for graph alliances
Graph alliances are recently developed global properties of any symmetric graph. Our purpose in the present paper is to design self-stabilizing fault tolerant distributed algorith...
Zhenyu Xu, Pradip K. Srimani
EUROCRYPT
2007
Springer
14 years 17 days ago
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
Motivated by the quest for reducing assumptions in security proofs in cryptography, this paper is concerned with designing efficient symmetric encryption and authentication schemes...
Ueli M. Maurer, Johan Sjödin