Sciweavers

12194 search results - page 2353 / 2439
» cans 2010
Sort
View
JCS
2010
104views more  JCS 2010»
15 years 2 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
JCST
2010
147views more  JCST 2010»
15 years 2 months ago
Volumetric Vector-Based Representation for Indirect Illumination Caching
Abstract This paper introduces a caching technique based on a volumetric representation that captures low-frequency indirect illumination. This structure is intended for efficient ...
Romain Pacanowski, Xavier Granier, Christophe Schl...
JCT
2010
64views more  JCT 2010»
15 years 2 months ago
A new source of seed pairs for Golay sequences of length 2m
In 2007 Jedwab and Parker proposed [10] that the natural viewpoint for a Golay complementary sequence is as a projection of a multi-dimensional Golay array. In 2008 Fiedler, Jedwa...
Frank Fiedler, Jonathan Jedwab, Amy Wiebe
JCT
2010
83views more  JCT 2010»
15 years 2 months ago
Families of prudent self-avoiding walks
A self-avoiding walk (SAW) on the square lattice is prudent if it never takes a step towards a vertex it has already visited. Prudent walks differ from most classes of SAW that ha...
Mireille Bousquet-Mélou
JDWM
2010
180views more  JDWM 2010»
15 years 2 months ago
Investigating the Properties of a Social Bookmarking and Tagging Network
Social networks and collaborative tagging systems are rapidly gaining popularity as a primary means for storing and sharing data among friends, family, colleagues, or perfect stra...
Ralitsa Angelova, Marek Lipczak, Evangelos E. Mili...
« Prev « First page 2353 / 2439 Last » Next »