Sciweavers

1058 search results - page 100 / 212
» It's Doomed; We Can Prove It
Sort
View
DRMTICS
2005
Springer
14 years 3 months ago
Algorithms to Watermark Software Through Register Allocation
Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Softwar...
William Zhu, Clark D. Thomborson
APPROX
2006
Springer
121views Algorithms» more  APPROX 2006»
14 years 1 months ago
A Randomized Solver for Linear Systems with Exponential Convergence
Abstract. The Kaczmarz method for solving linear systems of equations Ax = b is an iterative algorithm that has found many applications ranging from computer tomography to digital ...
Thomas Strohmer, Roman Vershynin
SIROCCO
2008
13 years 11 months ago
Sharpness: A Tight Condition for Scalability
: A distributed system is scalable if the rate at which it completes its computation and communication tasks does not depend on its size. As an example, the scalability of a peer-t...
Augustin Chaintreau
CGF
2010
153views more  CGF 2010»
13 years 10 months ago
Localized Delaunay Refinement for Sampling and Meshing
The technique of Delaunay refinement has been recognized as a versatile tool to generate Delaunay meshes of a variety of geometries. Despite its usefulness, it suffers from one la...
Tamal K. Dey, Joshua A. Levine, A. Slatton
CG
2006
Springer
13 years 10 months ago
Function-based shape modelling extension of the Virtual Reality Modelling Language
In this paper we propose a new approach to web visualisation with VRML based on a function-based shape modelling, which unifies different types of mathematical functions in order ...
Qi Liu, Alexei Sourin