Sciweavers

41 search results - page 2 / 9
» ca 2003
Sort
View
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
14 years 2 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
14 years 2 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
CA
2003
IEEE
14 years 2 months ago
Bottom-Up Visual Attention for Virtual Human Animation
We present a system for the automatic generation of bottom-up visual attention behaviours in virtual humans. Bottom-up attention refers to the way in which the environment solicit...
Christopher Peters, Carol O'Sullivan
CA
2003
IEEE
14 years 2 months ago
Realistic Human Walking Paths
Pedestrian navigation is a complex function of human dynamics, a desired destination, and the presence of obstacles. People cannot stop and start instantaneously and their turning...
David C. Brogan, Nicholas L. Johnson
CA
2003
IEEE
14 years 2 months ago
Improvements on a Simple Muscle-Based 3D Face for Realistic Facial Expressions
Facial expressions play an important role in face-to-face communication. With the development of personal computers capable of rendering high quality graphics, computer facial ani...
The Duy Bui, Dirk Heylen, Anton Nijholt