2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
We discuss the properties of force-feedback haptic simulation systems that fundamentally limit the re-creation of periodic gratings, and hence, of any texture. These include sampl...
— Scan matching is used as a building block in many robotic applications, for localization and simultaneous localization and mapping (SLAM). Although many techniques have been pr...
Using powerful tools on genus 2 curves like the Kummer variety, we generalize the Montgomery method for scalar multiplication to the jacobian of these curves. Previously this metho...
In this paper we first present two tagging mechanisms; the SCISM and IA-64; thereafter we describe the mapping of IA-64 ISA to a SCISM configuration without changing or reassigni...