Sciweavers

5843 search results - page 1057 / 1169
» Software Security in Practice
Sort
View
FIRSTMONDAY
2007
61views more  FIRSTMONDAY 2007»
13 years 10 months ago
Implementing openness: An international institutional perspective
The debate on “openness” has tended to focus on standard setting, software copyrights, patent policy and collaborative innovation models – large issues that evoke heated deb...
Sacha Wunsch-Vincent, Taylor Reynolds, Andrew Wyck...
AAECC
2005
Springer
99views Algorithms» more  AAECC 2005»
13 years 10 months ago
Formulae for Arithmetic on Genus 2 Hyperelliptic Curves
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete logarithm problem. In this article we present explicit formulae to perform the gro...
Tanja Lange
TCS
2008
13 years 10 months ago
On the complexity of real root isolation using continued fractions
We present algorithmic, complexity and implementation results concerning real root isolation of integer univariate polynomials using the continued fraction expansion of real algeb...
Elias P. Tsigaridas, Ioannis Z. Emiris
TELSYS
2008
99views more  TELSYS 2008»
13 years 10 months ago
Mote-based underwater sensor networks: opportunities, challenges, and guidelines
Most underwater networks rely on expensive specialized hardware for acoustic communication and modulation. This has impeded wide scale deployments of underwater sensor networks and...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
TOG
2008
235views more  TOG 2008»
13 years 10 months ago
Articulated mesh animation from multi-view silhouettes
Details in mesh animations are difficult to generate but they have great impact on visual quality. In this work, we demonstrate a practical software system for capturing such deta...
Daniel Vlasic, Ilya Baran, Wojciech Matusik, Jovan...
« Prev « First page 1057 / 1169 Last » Next »