Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
This paper presents a simple technique for generating anisotropic surface triangulations using a generic unstructured quadrilateral decomposition of CAD entities that map to a log...
In this paper, we propose a new interpolatory subdivision scheme for generating nice-looking curvature-continuous curves of round shapes. The scheme is based on a diffusion of nor...
Yutaka Ohtake, Alexander G. Belyaev, Hans-Peter Se...
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
— Since Witsenhausen put forward his remarkable counterexample in 1968, there have been many attempts to develop efficient methods for solving this non-convex functional optimiz...