Sciweavers

3238 search results - page 49 / 648
» Not Enough Points Is Enough
Sort
View
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 7 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
CGF
2005
111views more  CGF 2005»
13 years 7 months ago
Temporally Coherent Irradiance Caching for High Quality Animation Rendering
In rendering of high quality animations that include global illumination, the final gathering and irradiance caching are considered standard procedures. However, the computational...
Miloslaw Smyk, Shin-ichi Kinuwaki, Roman Durikovic...
JSAC
2007
56views more  JSAC 2007»
13 years 7 months ago
Grouping and partner selection in cooperative wireless networks
— Various results to date have demonstrated the advantages of one or several relay nodes assisting transmissions in a wireless network. In many practical scenarios, not all nodes...
Aria Nosratinia, Todd E. Hunter
CONCURRENCY
2004
77views more  CONCURRENCY 2004»
13 years 7 months ago
Grids of agents for computer and telecommunication network management
The centralized system approach for computer and telecommunication network management has been presenting scalability problems along with the growth in the number and diversity of...
Marcos Dias de Assunção, Fernando Lu...
EWC
2010
112views more  EWC 2010»
13 years 6 months ago
Meshing volumes with curved boundaries
Abstract This paper introduces a three-dimensional mesh generation algorithm for domains whose boundaries are curved surfaces, possibly with sharp features. The algorithm combines ...
Steve Oudot, Laurent Rineau, Mariette Yvinec