Sciweavers

905 search results - page 167 / 181
» The Case Against Micropayments
Sort
View
VISSYM
2004
13 years 9 months ago
Occlusion Culling for Sub-Surface Models in Geo-Scientific Applications
We present a three pass occlusion culling algorithm, which makes efficient use of hardware support. Our geo-scientific sub-surface data sets consist typically of a set of high res...
John Plate, Anselm Grundhöfer, Benjamin Schmi...
SODA
1997
ACM
169views Algorithms» more  SODA 1997»
13 years 9 months ago
Partial Matching of Planar Polylines Under Similarity Transformations
Given two planar polylines T and P with n and m edges, respectively, we present an Om2 n2  time, Omn space algorithm to nd portions of the text" T which are similar in sh...
Scott D. Cohen, Leonidas J. Guibas
WCE
2007
13 years 9 months ago
On the Non-Gaussian Nature of Random Vehicle Vibrations
—This paper presents one of the outcomes of a research project concerned with the development of a method for synthesizing, under controlled conditions in the laboratory, the ran...
Vincent Rouillard
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
ADHOC
2007
139views more  ADHOC 2007»
13 years 8 months ago
Bounded-distance multi-clusterhead formation in wireless ad hoc networks
We present a clustering technique addressing redundancy for bounded-distance clusters, which means being able to determine the minimum number of cluster-heads per node, and the ma...
Marco Aurélio Spohn, J. J. Garcia-Luna-Acev...