Sciweavers

2125 search results - page 96 / 425
» Points with Type-2 Operations
Sort
View
FC
2004
Springer
78views Cryptology» more  FC 2004»
14 years 2 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
GECCO
2004
Springer
134views Optimization» more  GECCO 2004»
14 years 2 months ago
Analysis and Improvements of the Adaptive Discretization Intervals Knowledge Representation
In order to handle classification problems with real-valued attributes using discretization algorithms it is necessary to obtain a good and reduced set of cut points in order to l...
Jaume Bacardit, Josep Maria Garrell i Guiu
ISCAS
2003
IEEE
62views Hardware» more  ISCAS 2003»
14 years 2 months ago
Simple noise formulas for MOS analog design
The designer needs simple and accurate models to estimate noise in MOS transistors as a function of their size, bias point and technology. In this work, we present a simple, conti...
Alfredo Arnaud, Carlos Galup-Montoro
ACISP
2007
Springer
14 years 29 days ago
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
This paper presents a new approach to precompute all odd points [3]P, [5]P, . . . , [2k - 1]P, k 2 on an elliptic curve over Fp. Those points are required for the efficient evalua...
Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
VMV
2000
169views Visualization» more  VMV 2000»
13 years 10 months ago
A Non-Linear Subdivision Scheme for Triangle Meshes
Subdivision schemes are commonly used to obtain dense or smooth data representations from sparse discrete data. E. g., B-splines are smooth curves or surfaces that can be construc...
Stefan Karbacher, Stephan Seeger, Gerd Häusle...