نتایج جستجو برای: distance bounding protocol

تعداد نتایج: 489170  

Journal: :Comput. Graph. Forum 2016
Peng Du Young J. Kim Sung-Eui Yoon

We present a novel, compact bounding volume hierarchy, TSS BVH, for ray tracing subdivision surfaces computed by the Catmull-Clark scheme. We use Tetrahedron Swept Sphere (TSS) as a bounding volume to tightly bound limit surfaces of such subdivision surfaces given a user tolerance. Geometric coordinates defining our TSS bounding volumes are implicitly computed from the subdivided mesh via a sim...

1996
Michael Squadrito Levon Esibov Lisa Cingiser DiPippo Victor Fay Wolfe Michael Milligan

This paper presents two concurrency control protocols for real-time object-oriented systems. One of the protocols (A ected Set Priority Ceiling Protocol) is designed for single-node systems, and the other (Distributed A ected Set Priorityt Ceiling Protocol) is designed for distributed systems. Both protocols combine features of semantic concurrency control for added concurrency, with priority c...

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2009

Journal: :CoRR 2004
Andris Ambainis William I. Gasarch Aravind Srinivasan Andrey Utis

Alice and Bob want to know if two strings of length n are almost equal. That is, do they differ on at most a bits? Let 0 ≤ a ≤ n − 1. We show that any deterministic protocol, as well as any error-free quantum protocol (C∗ version), for this problem requires at least n− 2 bits of communication. We show the same bounds for the problem of determining if two strings differ in exactly a bits. We als...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2004
Andris Ambainis William I. Gasarch Aravind Srinivasan Andrey Utis

Alice and Bob want to know if two strings of length n are almost equal. That is, do they differ on at most a bits? Let 0 ≤ a ≤ n − 1. We show that any deterministic protocol, as well as any error-free quantum protocol (C∗ version), for this problem requires at least n− 2 bits of communication. We show the same bounds for the problem of determining if two strings differ in exactly a bits. We als...

2007
Andris Ambainis William Gasarch Aravind Srinivasan Andrey Utis

Alice and Bob want to know if two strings of length n are almost equal. That is, do they differ on at most a bits? Let 0 ≤ a ≤ n − 1. We show that any deterministic protocol, as well as any error-free quantum protocol (C∗ version), for this problem requires at least n− 2 bits of communication. We show the same bounds for the problem of determining if two strings differ in exactly a bits. We als...

Journal: :Journal of Cognition and Culture 2001

Journal: :Computer Aided Geometric Design 2014
Hans-Peter Schröcker Matthias J. Weber

We present a method for guaranteed collision detection with toleranced motions. The basic idea is to consider the motion as a curve in the 12-dimensional space of affine displacements, endowed with an object-oriented Euclidean metric, and cover it with balls. The associated orbits of points, lines, planes and polygons have particularly simple shapes that lend themselves well to exact and fast c...

2005
Sylvain Pasini Serge Vaudenay Yi Lu

A secure peer-to-peer communication over an insecure channel without any prior exchanged key can be established with the help of an authentication step to exchange a public key. Then, standard methods of public-key cryptography such as RSA can be used to communicate securely. In this work, we concentrate on message authentication protocols which require an extra authenticated channel. We start ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید