Sciweavers

2629 search results - page 65 / 526
» complex 2009
Sort
View
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
14 years 4 months ago
An Analysis of the Compact XSL Attack on BES and Embedded SMS4
The XSL attack when applied on BES-128 has been shown to have an attack complexity of 2100 , which is faster than exhaustive search. However at FSE 2007, Lim and Khoo analyzed the ...
Jiali Choy, Huihui Yap, Khoongming Khoo
ICC
2009
IEEE
160views Communications» more  ICC 2009»
14 years 4 months ago
Application of Phase Shift in Coherent Multi-Relay MIMO Communications
—In this paper we propose a new low feedback and low complexity scheme that adjusts the phases at the relays, thus allowing for the coherent combining of signals from multiple re...
Yi Zheng, Hani Mehrpouyan, Steven D. Blostein
SMA
2009
ACM
157views Solid Modeling» more  SMA 2009»
14 years 4 months ago
Constraint-based model synthesis
We present a method for procedurally modeling general complex 3D shapes. Our approach is targeted towards applications in digital entertainment and gaming and can automatically ge...
Paul Merrell, Dinesh Manocha
COMPLEX
2009
Springer
14 years 4 months ago
Community Detection of Time-Varying Mobile Social Networks
In this paper, we present our ongoing work on developing a framework for detecting time-varying communities on human mobile networks. We define the term community in environments ...
ShuYan Chan, Pan Hui, Kuang Xu
FCS
2009
13 years 7 months ago
The Importance of Symmetric Representation
- A representation for a set is defined to be symmetric if the space required for the representation of the set is the same as the space required for representation of the set'...
Thomas O'Neil