Sciweavers

AMC
2005
146views more  AMC 2005»
13 years 11 months ago
A functional language to implement the divide-and-conquer Delaunay triangulation algorithm
This paper investigates the implementation of a functional language algorithm for the divide-and-conquer Delaunay triangulation. The global aim is to improve its performance. Up t...
André L. Moura, José R. Camacho, Seb...
AMC
2005
90views more  AMC 2005»
13 years 11 months ago
A genetic algorithm approach for the time-cost trade-off in PERT networks
Amir Azaron, Cahit Perkgoz, Masatoshi Sakawa
AMC
2005
206views more  AMC 2005»
13 years 11 months ago
Logistics networks: A game theory application for solving the transshipment problem
As competition from emerging economies such as China and India puts pressure on global supply chains and as new constraints emerge, it presents opportunities for approaches such a...
Pedro M. Reyes
AMC
2005
145views more  AMC 2005»
13 years 11 months ago
Connectivity graphs as models of local interactions
In this paper, we study graphs that arise from certain sensory and communication limitations on the local interactions in multi-agent systems. In particular, we show that the set ...
Abubakr Muhammad, Magnus Egerstedt
AMC
2005
83views more  AMC 2005»
13 years 11 months ago
Disease emergence in deterministic and stochastic models for host and pathogen
Robert K. McCormack, Linda J. S. Allen
AMC
2005
121views more  AMC 2005»
13 years 11 months ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao
AMC
2005
127views more  AMC 2005»
13 years 11 months ago
Option valuation by using discrete singular convolution
This paper explores the utility of a discrete singular convolution (DSC) algorithm for solving the Black
Shan Zhao, G. W. Wei
AMC
2005
188views more  AMC 2005»
13 years 11 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su
AMC
2005
148views more  AMC 2005»
13 years 11 months ago
Review of model order reduction methods for numerical simulation of nonlinear circuits
In this paper, we reviewed several newly presented nonlinear model order reduction methods, we analyze these methods theoretically and with experiments in detail. We show the prob...
Lihong Feng
AMC
2005
147views more  AMC 2005»
13 years 11 months ago
Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
Hwang and Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authorized proxy signers to sign messages on behalf of a group of original signers. ...
Yuh-Dauh Lyuu, Ming-Luen Wu