Sciweavers

6120 search results - page 1103 / 1224
» The Power of Linear Functions
Sort
View
FC
1997
Springer
86views Cryptology» more  FC 1997»
14 years 2 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
GRAPHITE
2007
ACM
14 years 2 months ago
Compact and efficient generation of radiance transfer for dynamically articulated characters
We present a data-driven technique for generating the precomputed radiance transfer vectors of an animated character as a function of its joint angles. We learn a linear model for...
Derek Nowrouzezahrai, Patricio D. Simari, Evangelo...
FOCS
2009
IEEE
14 years 2 months ago
Space-Efficient Framework for Top-k String Retrieval Problems
Given a set D = {d1, d2, ..., dD} of D strings of total length n, our task is to report the "most relevant" strings for a given query pattern P. This involves somewhat mo...
Wing-Kai Hon, Rahul Shah, Jeffrey Scott Vitter
CHI
2010
ACM
14 years 1 months ago
Characteristics of pressure-based input for mobile devices
We conducted a series of user studies to understand and clarify the fundamental characteristics of pressure in user interfaces for mobile devices. We seek to provide insight to cl...
Craig Stewart, Michael Rohs, Sven G. Kratz, Georg ...
CIARP
2008
Springer
14 years 5 days ago
Pose Estimation for Sensors Which Capture Cylindric Panoramas
This paper shows that there exist linear models for sensor pose estimation for multi-view panoramas defined by a symmetric or leveled pair of cylindric images. It assumes that pair...
Fay Huang, Reinhard Klette, Yun-Hao Xie
« Prev « First page 1103 / 1224 Last » Next »