Sciweavers

882 search results - page 151 / 177
» Visibility-driven transfer functions
Sort
View
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
VR
1999
IEEE
154views Virtual Reality» more  VR 1999»
14 years 1 hour ago
A Virtual Assembly Design Environment
The Virtual Assembly Design Environment (VADE) is a Virtual Reality (VR) based engineering application which allows engineers to evaluate, analyze, and plan the assembly of mechan...
Sankar Jayaram, Yong Wang, Uma Jayaram, Kevin W. L...
GIS
1999
ACM
14 years 27 min ago
Integrating GPS Data Within Embedded Internet GIS
In this paper we investigate the development of an embedded and mobile geographic information system. Its main characteristics concern the possibility to access various informatio...
Arunas Stockus, Alain Bouju, Frédéri...
RT
1999
Springer
13 years 12 months ago
Decoupling Polygon Rendering from Geometry using Rasterization Hardware
The dramatically increasing size of polygonal models resulting from 3D scanning devices and advanced modeling techniques requires new approaches to reduce the load of geometry tran...
Rüdiger Westermann, Ove Sommer, Thomas Ertl
INFOCOM
1998
IEEE
13 years 12 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai