Sciweavers

350 search results - page 66 / 70
» Word Equations with Two Variables
Sort
View
ENVSOFT
2006
72views more  ENVSOFT 2006»
13 years 11 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...
IJMMS
2006
103views more  IJMMS 2006»
13 years 10 months ago
Cultural differences on attention and perceived usability: Investigating color combinations of animated graphics
This experimental study investigates the effects of animated graphic colors on attention and perceived usability of users from two cultural groups, American and Thai. The experime...
Jantawan Noiwan, Anthony F. Norcio
IOR
2006
177views more  IOR 2006»
13 years 10 months ago
Combinatorial Benders' Cuts for Mixed-Integer Linear Programming
Mixed-Integer Programs (MIP's) involving logical implications modelled through big-M coefficients, are notoriously among the hardest to solve. In this paper we propose and an...
Gianni Codato, Matteo Fischetti
IPL
2002
125views more  IPL 2002»
13 years 10 months ago
A note concerning the closest point pair algorithm
An algorithm, described by Sedgewick, finds the distance between the closest pair of n given points in a plane using a variant of mergesort. This takes O(n log n) time. To prove t...
Martin Richards
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
14 years 11 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...