Sciweavers

15375 search results - page 187 / 3075
» cans 2008
Sort
View
CVGIP
2006
87views more  CVGIP 2006»
13 years 8 months ago
Swirling-sweepers: Constant-volume modeling
Swirling-sweepers is a new method for modeling shapes while preserving volume. The artist describes a deformation by dragging a point along a path. The method is independent of th...
Alexis Angelidis, Marie-Paule Cani, Geoff Wyvill, ...
DAM
2006
124views more  DAM 2006»
13 years 8 months ago
Coloring copoints of a planar point set
To a set of n points in the plane, one can associate a graph that has less than n2 vertices and has the property that k-cliques in the graph correspond vertex sets of convex k-gon...
Walter Morris
DM
2006
71views more  DM 2006»
13 years 8 months ago
Pair lengths of product graphs
The pair length of a graph G is the maximum positive integer k, such that the vertex set of G can be partitioned into disjoint pairs {x, x }, such that d(x, x ) k for every x V (...
Demetres Christofides
IEICET
2008
52views more  IEICET 2008»
13 years 8 months ago
Proposal of Stackable ROADM for Wavelength Transparent IP-over-CWDM Networks
Stackable ROADMs (S-ROADMs) have been proposed for use in regional IP-over-CWDM networks. The S-ROADM can be constructed by connecting modules with different wavelengths required i...
Md. Nooruzzaman, Yuichi Harada, Osanori Koyama, Yu...
IJACT
2008
86views more  IJACT 2008»
13 years 8 months ago
Securing group key exchange against strong corruptions and key registration attacks
: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxiliary (ephemeral) secret information generated during the execution. Strong corruptions ...
Emmanuel Bresson, Mark Manulis