Sciweavers

2799 search results - page 439 / 560
» computing 1998
Sort
View
CCS
1998
ACM
15 years 6 months ago
A New Public Key Cryptosystem Based on Higher Residues
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA integer. We introduce two versions of our scheme, one d...
David Naccache, Jacques Stern
VISUALIZATION
1998
IEEE
15 years 6 months ago
Real-time techniques for 3D flow visualization
Visualization of three dimensional flow has to overcome a lot of problems to be effective. Among them are occlusion of distant details, lack of directional and depth hints and clu...
Anton L. Fuhrmann, Eduard Gröller
TIS
1998
59views more  TIS 1998»
15 years 2 months ago
Information Access in Africa: Problems with Every Channel
: Every information channel within Africa is restricted. Limited budgets cause televison stations to produce few shows of their own and to fill airtime with cheap American imports ...
William Wresch
JCO
1998
136views more  JCO 1998»
15 years 2 months ago
A Greedy Randomized Adaptive Search Procedure for the Feedback Vertex Set Problem
Abstract. A Greedy Randomized Adaptive Search Procedure (GRASP) is a randomized heuristic that has produced high quality solutions for a wide range of combinatorial optimization pr...
Panos M. Pardalos, Tianbing Qian, Mauricio G. C. R...
MOC
1998
108views more  MOC 1998»
15 years 2 months ago
Numerical conformal mapping based on the generalised conjugation operator
Abstract. An iterative procedure for numerical conformal mapping is presented which imposes no restriction on the boundary complexity. The formulation involves two analytically equ...
Bao Cheng Li, Stavros Syngellakis