An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements
|
|
- Samuel Shaw
- 6 years ago
- Views:
Transcription
1 The International Arab Journal of Information Technology, Vol. 1, No., July An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department, Zarka Private Univerity, Jordan Abtract: Thi paper introduce everal new technique and algorithm to peed up the elliptic curve digital ignature and reduce the ize of the tranited parameter. The baic idea i to ue pare element for the curve coefficient and the firt bae point coordinate. The implementation analyi how that the addition formula calculation are improved about 40 percent. The pare element are introduced with a compact repreentation, thu the digital ignature calculation are peeded up about percent, and the public key parameter are reduced about 7-48 percent. Keyword: Elliptic curve cryptography, projective coordinate, pare element, elliptic curve digital ignature. Received July 14, 00; accepted September 4, Introduction The main advantage of uing the finite group of Elliptic Curve (EC) i that it dicrete logarithm problem i believed to be harder than the dicrete logarithm problem for the multiplication group of a finite field. There i no known ub-exponential algorithm that can be applied to the elliptic curve dicrete logarithm problem. Another advantage that make elliptic curve more attractive i the poibility of optimizing the arithmetic operation in the underlying field [6]. Thi ha led to appearance of everal elliptic curve cryptography product uch a ecurity builder, SSL plu, WTLS pu, TrutPoint etc. In addition many companie have purchaed licene to ue EC code and embed them in their product [4, 5, 7]. By uing Elliptic Curve Cryptoytem ECC we can ue maller key ize with the ame level of cryptographic ecurity for DSA or RSA, whereby we will get maller public key certificate, fater implementation, lower power requirement and maller hardware proceor [15, 8]. Subequently ECC can be applied to many ytem and application [17, 18]. Elliptic curve cryptography application and protocol rely on the elliptic curve group operation uch a adding, doubling and calar multiplication, which will not be feaible unle a uitable elliptic curve finite group and efficient underlying finite field operation are ued. Thu any enhancement in the underlying finite field operation will peed up all the EC application [, 16]. Our approach to enhance the operation i the high utilization of the pare element in GF( n ). Several new algorithm are introduced uch a electing random pare element algorithm, finding pare bae point, compreing and decompreing the pare element and pare multiplication over a polynomial bai. The new algorithm improve the EC in three apect namely: Speed up the curve coefficient multiplication, peed up the multiplication of the firt bae point coordinate and reduce the ize of the tranited parameter. Thi new approach doe not reduce the ecurity to the fact that the elliptic curve over GF( n ) with pare coefficient are iomorphic to the curve which have coefficient elected randomly. Furthermore, although the bae point are retricted to be pare; the number of pare bae point i till very huge and provide the uer with rich choice. The experiment how that the reult of thi improvement varie from one protocol to another baed on the rate of uing the bae point, the number of tranited bit, the key ize and the ratio of doubling to adding. The remainder of thi paper i organized a follow. Section preent the mot efficient elliptic curve projective coordinate formula. In ection, we introduce the algorithm to elect and to compre the pare element. Moreover, we dicu the abundance of the pare point. Section 4 introduce the pare multiplication over polynomial bai. Finally, in ection 5, we how the improvement in elliptic curve digital ignature by uing the uggeted approache.. EC Projective Coordinate Operation In order to find the um of two ditinct point on the elliptic curve E over (GF( n )) by uing affine coordinate, one invere and one multiplication are needed, but to double a point one invere and two multiplication are required. Since the implementation of elliptic curve operation indicate that the invere operation i till more expenive than a field
2 04 The International Arab Journal of Information Technology, Vol. 1, No., July 004 multiplication, where Hankeron and other how that the cot ratio of the inverion to the multiplication over polynomial bai i 1-10 [, 9, 10]. Thu, the projective coordinate X, Y and Z on the curve y + xy= x + a x + a 6 over GF( n ) are ued to replace the invere operation by multiplication uch that [1]: Formula 1: (X 1, Y 1, 1) + (X, Y, Z )= (X, Y, Z ), where U = Z + X1 X Y1 Y T Z S = Z +, = S, Z = T V = Z X, ( ) 1 X = U + T U + S + Ta Y = ( V + X )( TU + Z + Z C ) Formula 1 need 9 field multiplication and 8 temporary variable are required. López and Dahab introduce a new doubling formula which require 5 field multiplication a follow [11-1]: Formula : (X 1, Y 1, Z 1 )= (X, Y, Z ), where Z = Z1 X1 4 4 = X1 a6z1 X + 4 Y = a6z1 Z + X ( a Z + Y1 + a6z. Spare Element Thi ection introduce algorithm to elect random curve have pare coefficient and pare bae point. The complexity analyi for the uggeted algorithm indicate that the time to generate pare element and bae point i relatively ignored. Moreover, the reduction of the pare element length i clarified..1. Select Random Spare Coefficient The firt tep to find a uitable elliptic curve i to elect random coefficient (a and a 6 ) and the election i repeated until a propective curve i found. However, there i no ecurity threat if the coefficient are retricted to be pare in GF(q). Moreover the number of generated curve i till very huge. Algorithm 1 i uggeted to generate random curve with pare coefficient. Algorithm 1: Generate random pare coefficient in GF( q) Input: The finite field GF( n ), (the maximum number of one) Output: The pare element a and a 6 in GF(q) 1. j 0. For i= 1 to rand () v rand (n ) If x v = 1 Then i i -1 (x v i the v th bit in the element x) 4 1 ) Ele x v = 1. If j= 0 then a x, j 1, x 0 and goto tep Ele a 6 x 4. Return a and a 6... The Upper Bound of Spare Bae Point Thi ubection how that even if the bae point i retricted to be pare, the number of generated point i till very huge. Definition: Let G be a point on E (GF( n )) repreented in the binary expand. Then the point G i pare if and only if the firt coordinate ha a few one o that the number of one i le than 5 percent from the field ize. Moreover the point G i called pare with one if the maximum number of the one in the firt coordinate i. Theorem: Let E be any elliptic curve over GF( n ); then the upper bound of the pare point with one on E i ( n i ) / t! i = 0 Proof: Let x be any element in GF(q) and ha t one, then x can be repreented in n n! = t t!( n t)! = t 1 i= 0 ( n i) / t! different way. If the maximum number of the one in the x coordinate i, then x can be repreented in ( n i ) / t! i = 0 different way. Since the quadratic equation ha two olution when x i in GF(q), then the upper bound for the number of pare point with one on E i ( n i ) / t! i = 0 The order of the elected elliptic curve mut be prime or nearly prime (the curve E j ha a nearly prime order if #E j = r j p j for mall integer r j and large prime number p j, where j i an integer), then the approximately average number (if the tet i run over many curve E j ) of pare bae point with one i: i = 0 ( n i ) / d ( t!) where d i the average of r j. Thu, thi number i large enough to give the uer rich choice, for example if n= 160 and = 7 then the number of pare bae point are
3 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element 05 nearly However there i no ecurity threat known in cae if many uer chooe the ame bae point... Selecting a Spare Bae Point Algorithm i uggeted to find a random pare bae point P, with one for any nearly prime elliptic curve over GF( n ), where P ha a large prime order. Algorithm : Chooing Random pare bae point with one. Input: An elliptic curve E over GF(q), the curve order rk, and the maximum number of one. Output: A pare bae point with one. 1. For i=1 to rand (). v rand (n ). If xv= 1 Then i i -1 (xv i the vth bit in the element x) Ele xv= 1 4. End For 5. Find the coordinate y by olving the quadratic equation, if y doe not exit go to tep 1 ele et y to one olution of the quadratic equation (randomly). 6. G (x,y) 7. P k G 8. If P= O then go to tep 1 9. Q r G 10. If Q O then output wrong order and top 11. Output G. The complexity of the previou algorithm i equal to the complexity of tandard algorithm to generate random bae point..4. Compact Spare Element Repreentation To utilize the pare field element in the real communication and implementation; Algorithm and 4 are introduced to compre and decompre any pare element with one in relatively ignored time. Algorithm : Compreion of any pare element in GF( n ), where n 56 Input: Spare element x. Output: Compreed repreentation array C. 1. m 1. For i=1 to n If x i 1 then continue C m = i m m + 1. Return C Algorithm 4: Decompreion of compact repreentation Input: Compreed repreentation array C with length. Output: Spare element x 1. For i=1 to t C m x t 1. Return x Since the dicrete problem for elliptic curve with field ize le than 56 i ufficient for the current application and at leat for next few year; dicuion will be retricted to thi field ize, but it can be extended eaily to any other field ize. Thu each element in the array C (which form the compact repreentation for a pare element) can be repreented in 8 bit, o the ize of the array C i (8). Table 1 how the reduction rate of the pare element. Table 1. The reduction rate of the pare element. Reduction Conventional Compact Size (n) Rate Spare Multiplication Over Polynomial Bai The field multiplication i the mot time conuming operation for adding two elliptic curve point particularly in the projective coordinate. Therefore thi ection how the great improvement whenever pare field element are ued over polynomial bai. Algorithm 5 [1] i ued to find firt the polynomial multiplication and then the reult i reduced by the irreducible polynomial f(x). The following notation are ued; if a(x) i element in GF( n ) then a(x) i aociated with the binary vector a= (a n-1,..., a, a 1, a 0 ), w i the word ize, t i the number of word that are neceary to repreent the vector a, thu the array A= (A[t-1],..., A[], A[1], A[0]) where A[h] i the h th word in the vector a, if C= (C[m],..., C[1], C[0]) then the truncated vector i C{ j}= (C[m],..., C[ j+1], C[j]) Algorithm 5: Polynomial multiplication (Right to left). Input: The polynomial a(x) and b(x) in GF( n ). Output: c(x)= a(x). b(x). 1. C 0. For k= 0 to w-1 do For j= 0 to t 1 do If the k th bit of A[j] i 1 then add B to C{j} If k w-1 then C C x. Return c
4 06 The International Arab Journal of Information Technology, Vol. 1, No., July 004 The previou algorithm need w-1 hift operation and nearly n/ addition operation. Algorithm 6 i uggeted to compute the pare element multiplication in the polynomial bai repreentation. Algorithm 6: Spare polynomial multiplication. Input: The array A with length (the compreed repreentation of a(x) ) and the polynomial b(x) in GF( m ). Output: c(x)= a(x). b(x). 1. For i=1 to T= b<< (A i 1) c= c T. Return c The number of left hift and bit wie addition in the previou algorithm i equal to the number of one in the pare element. To implify the calculation, aume that the left hift cot i equal to the addition operation. Then Table ummarize the improvement by uing pare multiplication algorithm over the general field multiplication in algorithm 5 for word ize w=. Table. Comparion between the multiplication of pare and random field element in polynomial bai. Size (n) Algorithm (5) #Operation Algorithm (6) = 6 #Operation The Cot Ratio if a, a 6 and the firt coordinate of the bae point are pare, then formula 1 can be implemented with only 5 general field multiplication and 4 pare element multiplication. While formula can be implemented with only general field multiplication and pare element multiplication. 5. The Improvement in EC Digital Signature The digital ignature i an important algorithm that relie on public key technology, therefore any enhancement in the ignature generation or ignature verification will have impact on the e-commerce, e- payment and other application. The curve and bae point generation i the firt tep to implement a digital ignature baed on elliptic curve cryptography; the econd i generating the key which are ued to ign a meage and verify the ignature. Thee tep can be decribed a follow [, 14]: EC and Bae Point Generation: The firt party A doe the following: 1. Select a uitable elliptic curve E defined over GF(q),. Select a bae point P E(GF(q)) of order l, where l i the elliptic curve order. EC Key Generation: 1. Select an integer t in the interval [1, l - 1].. Compute the point Q= t P. A' public key i (a, a 6, P, l, Q) and A' private key i t. EC Signature Generation: To ign a meage m, A doe the following: 1. Select an integer k in the interval [1, l - 1].. Compute G= kp= (x 1, y 1 ).. Compute the firt ignature component r= x 1 mod l. (Here x 1 i the firt coordinate in the point G.) If r= 0, go to tep Compute k -1 mod l and e= h(m). 5. Compute = k -l {e + t r} mod l, where h i any Secure Hah Algorithm. 6. If = 0, then go to tep 1. The ignature for the meage m i the pair of integer (r, ). EC Signature Verification: To verify A ignature (r, ): 1. Obtain a copy of A' public key (a, a 6, P, l, Q).. Verify that r and are integer in the interval [1, l - 1].. Compute w= -1 mod l and f = h(m). 4. Compute u 1 = f w mod l. 5. Compute u = r w mod l. 6. Compute u 1 P + u Q= (x 0, y 0 ) and v= x 0 mod l. 7. Accept the ignature if and only if v= r. If a, a 6 and the firt coordinate of the bae point P are pare, then by uing the uggeted approach and algorithm; the number of public key bit will be reduced to (4 + n + ) from (5n +) for the tandard etting. Subequently reducing the neceary time for ending and receiving the EC digital ignature. Table how the percentage of the bit reduction in the public digital ignature parameter. Table. The reduction rate of the bit by uing the new approach. PK PK Reduction Size (n) Standard Compact Rate Aume that the curve order l, t, k, u 1 and u are equal to the field ize n, d i the ratio of doubling to adding. If the Formula 1 i ued for adding and Formula i ued for doubling, then number of multiplication over
5 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element 07 GF( n ) for the ignature generation and key generation are given by the equation Number of Multiplication= 5*(The number of doubling)+9*(the number of adding) So #mult=5n+9(n/d)= n (5+9/d) (1) and the verification: #mult= n( /d ) () while the number of multiplication for the ignature generation and key generation by uing the new approach are reduced to #mult= n( general field + pare +5/d general field +4/d pare () and the verification proce are reduced to #mult= n(6 general field + 4 pare +1/d general field +5/d pare ) (4) Thu the improvement in digital ignature i (1-multiplication cot of (1)/ cot of ()) * 100 and the improvement in the verification i (1-multiplication cot of ()/ cot of (4)) * 100 By uing the data in Table we can conider that the pare multiplication i approximately 10 time fater than the general field multiplication, therefore the improvement in the key generation, the ignature generation, and the verification proce are hown in Table 4. Table 4. The improvement in the digital ignature by uing the new approach. Size (n) Doubling/ Adding (d) 6. Concluion Signature Generation Improvement % Verification Proce Improve ment % 16 / / / / / To atify efficient computation and communication, everal algorithm are introduced uch a electing random pare element algorithm, finding pare bae point, compreing and decompreing the pare element, pare multiplication over polynomial bai. The new approache and algorithm lead to enhance the digital ignature implementation about percent, high reduction in the public key parameter by 7-48 percent and did not acrifice in the elliptic curve cryptography ecurity. Therefore, the elliptic curve application a e-cah and e-commerce can be implemented with better performance uing the uggeted approach. Reference [1] Al-Daoud E. and Ramlan M., A New Addition Formula for Elliptic Curve Over GF( n ), IEEE Tranaction on Computer, vol. 51, no. 8, pp , Augut 00. [] Al-Daoud E. and Ramlan M., Elliptic Curve Arithmetic Operation Over GF( n ) and GF(P) for Cryptoytem Purpoe, in Proceeding of the International Conference on Mathematic and it Application in the New Millennium, pp , 000. [] Blake I. F., Seroui G., and Smart N. P., Elliptic Curve in Cryptography, Univerity Pre, London, Cambridge, [4] Certicom, acceed on March 5, 00. [5] Gupta V., Gupta S., and Sheueling C., Performance Analyi of Elliptic Curve Cryptography for SSL, in Proceeding of ACM Workhop on Wirele Security, Atlanta, Georgia, 00. [6] Gura N., Eberle H., and Shantz S. H., Generic Implementation of Elliptic Curve Cryptography Uing Partial Reduction, in Proceeding of 9 th ACM Conference on Computer and Communication Security, Wahington DC, 00. [7] Gura N., Shantz S. C., Eberle H., Fincheltein D., Gupta S., Gupta V., and Stebila D., An End-to- End Sytem Approach to Elliptic Curve Cryptography, in Proceeding of CHES'00 Workhop on Cryptographic Hardware and Embedded Sytem, Lecture Note in Computer Science, Springer-Verlag, Redwood City, California, 00. [8] Ha J. S., Kim Y. H., and Lee K. Y., Compact Implementation of Elliptic Curve Cryptography Sytem Uing a FPGA, in Proceeding of the 9 th Korean Conference on Semiconductor, pp , 00. [9] Hankeron D., López J. and Meneze A. J., Software Implementation of Elliptic Curve Cryptography over Binary, in Proceeding of CHES'000, LNCS 1965, pp. 1-4, 000. [10] IEEE P16 Draft, Standard Specification for Public Key Cryptography, org/group/16/, verion D1, [11] King B., An Improved Implementation of Elliptic Curve Over GF() When Uing Projective Point Arithmetic, in Proceeding of 8 th Annual International Workhop on Selected Area in Cryptography (SAC'001), pp , 001. [1] López J. and Dahab R., High-Speed Software Multiplication in GF( m ), IC Technical Report, IC-00-09, Intitute of Computing, Univerity of Campina, 000. [1] López J. and Dahab R., Improved Algorithm for Elliptic Curve Arithmetic in GF( n ), in
6 08 The International Arab Journal of Information Technology, Vol. 1, No., July 004 Proceeding of 5 th Annual International Workhop on Selected Area in Cryptography (SAC'98), pp. 01-1, [14] Meneze A. J., Oorchot P. C., and Vantone S. A., Handbook of Applied Cryptography, CRC Pre, Boca Raton, [15] Paar C., Implementation Option for Finite Arithmetic for Elliptic Curve Cryptoytem, in Proceeding of Invited Preentation at the rd Workhop on Elliptic Curve Cryptography (ECC'99), Univerity of Waterloo, Waterloo, Canada, pp. 1-, [16] Roing M., Implementing Elliptic Curve Cryptography, Manning, Greenwich, [17] Sklavo N. and Koufopavlou O., Mobile Communication World: Security Implementation Apect- A State of the Art, Computer Science Journal of Moldova, Intitute of Mathematic and Computer Science, vol. 1, no., 00. [18] Weimerkirch A., Paar C., and Shantz C. S., Elliptic Curve Cryptography on a Palm OS Device, in Proceeding of the 6 th Autralaian Conference on Information Security and Privacy (ACISP'001), LNCS 119, Macquarie Univerity, Sydney, Autralia, pp , 001. Eam Al-Daoud graduated from Mu tah Univerity in He continued hi mater tudy at Al Al- Bayt Univerity majoring in numerical analyi. He recieved hi PhD from Univerity Putra Malayia. Hi reearch interet are namely pare matrice and cryptoytem.
AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationFast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation
Fast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation Julio López 1 and Ricardo Dahab 2 1 Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationImage authentication and tamper detection using fragile watermarking in spatial domain
International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationElliptic Curve Cryptography on a Palm OS Device
Elliptic Curve Cryptography on a Palm OS Device André Weimerskirch 1, Christof Paar 2, and Sheueling Chang Shantz 3 1 CS Department, Worcester Polytechnic Institute, USA weika@wpi.edu 2 ECE and CS Department,
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationDevelopment of an atmospheric climate model with self-adapting grid and physics
Intitute of Phyic Publihing Journal of Phyic: Conference Serie 16 (2005) 353 357 doi:10.1088/1742-6596/16/1/049 SciDAC 2005 Development of an atmopheric climate model with elf-adapting grid and phyic Joyce
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationCompressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit
Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More information( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1
A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationAnalysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer
International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationNEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1
International Journal of Technology (2017) 3: 519-527 ISSN 2086-9614 IJTech 2017 NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS Arash Eghdamian 1*, Azman Samsudin 1 1 School of Computer
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More information[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata
he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationDrawing Lines in 2 Dimensions
Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional
More informationBrief Announcement: Distributed 3/2-Approximation of the Diameter
Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationA Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints
A Fat Aociation Rule Algorithm Baed on Bitmap Computing with Multiple Minimum Support uing Maximum Contraint Jyothi Patil, and Dr. V.D.Mytri Abtract Mining aociation rule from databae i a timeconuming
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationStudying Software Implementations of Elliptic Curve Cryptography
Studying Software Implementations of Elliptic Curve Cryptography Hai Yan and Zhijie Jerry Shi Department of Computer Science and Engineering, University of Connecticut Abstract Elliptic Curve Cryptography
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationLecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization
Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationKS3 Maths Assessment Objectives
KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationKinematics Programming for Cooperating Robotic Systems
Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,
More informationGeneric GF(2 m ) Arithmetic in Software and its Application to ECC
Generic GF(2 m ) Arithmetic in Software and its Application to ECC André Weimerskirch 1, Douglas Stebila 2, and Sheueling Chang Shantz 3 1 Communication Security Group, Ruhr-Universität Bochum, Germany
More informationThe norm Package. November 15, Title Analysis of multivariate normal datasets with missing values
The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph
More information3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES
MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,
More informationBuilding a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique
202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique
More informationA Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology
A Study of a Variable Compreion Ratio and Diplacement Mechanim Uing Deign of Experiment Methodology Shugang Jiang, Michael H. Smith, Maanobu Takekohi Abtract Due to the ever increaing requirement for engine
More informationData Mining with Linguistic Thresholds
Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, 7-725 Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C.
More informationComparison of Methods for Horizon Line Detection in Sea Images
Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael
More informationA Fast Association Rule Algorithm Based On Bitmap and Granular Computing
A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationMotion Control (wheeled robots)
3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,
More informationIntegrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs
Proceeding of The 2016 IEEE International Conference on Real-time Computing and Robotic June 6-9, 2016, Angkor Wat, Cambodia Integrated Single-arm Aembly and Manipulation Planning uing Dynamic Regrap Graph
More informationAalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces
Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding
More informationAnnouncements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum
Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationSet-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing
Set-baed Approach for Lole Graph Summarization uing Locality Senitive Hahing Kifayat Ullah Khan Supervior: Young-Koo Lee Expected Graduation Date: Fall 0 Deptartment of Computer Engineering Kyung Hee Univerity
More informationA SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS
A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationIMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak
IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe
More informationMirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery
Mirror hape recovery from image curve and intrinic parameter: Rotationally ymmetric and conic mirror Nuno Gonçalve and Helder Araújo Λ Intitute of Sytem and Robotic Univerity of Coimbra Pinhal de Marroco
More informationElliptic Curve Cryptography
Elliptic Curve Cryptography Dimitri Dimoulakis, Steve Jones, and Lee Haughton May 05 2000 Abstract. Elliptic curves can provide methods of encryption that, in some cases, are faster and use smaller keys
More informationNearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks
Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationSecurity Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption
Journal of Electronic Teting (2018) 34:709 715 http://doi.org/10.1007/10836-018-5767-0 Security Analyi of the Efficient Chao Peudo-random Number Generator Applied to Video Encryption Dragan Lambić 1 Alekandar
More informationIMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR 1Prof. Renuka H. Korti, 2Dr. Vijaya C.
ISSN 2320-9194 13 International Journal of Advance Research, IJOAR.org Volume 1, Issue 7, July 2013, Online: ISSN 2320-9194 IMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationA CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT
Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449
More informationPROBLEM -1. where S. C basis x. 0, for entering
ISSN: 77754 ISO 9:8 Certified Volume 4 Iue 8 February 5 Optimum Solution of Linear Programming Problem by New Method Putta aburao; Supriya N. Khobragade and N.W.Khobragade Department of Mathematic RTM
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationThe Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm
The Comparion of Neighbourhood Set and Degree of an Interval Graph G Uing an Algorithm Dr.A.Sudhakaraiah, K.Narayana Aitant Profeor, Department of Mathematic, S.V. Univerity, Andhra Pradeh, India Reearch
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
113 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory, Univerity of Nebraka-Lincoln {yzheng,choueiry}@ce.unl.edu Abtract.
More informationUC Berkeley International Conference on GIScience Short Paper Proceedings
UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment
More informationPrime Field over Elliptic Curve Cryptography for Secured Message Transaction
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationUsing Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images
2009 10th International Conference on Document Analyi and Recognition Uing Moue Feedback in Computer Aited Trancription of Handwritten Text Image Verónica Romero, Alejandro H. Toelli, Enrique Vidal Intituto
More informationmapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,
More informationRepresentations and Transformations. Objectives
Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element
More informationA User-Attention Based Focus Detection Framework and Its Applications
A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information
More informationEfficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics
Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationAn efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed
Univerity of Wollongong Reearch Online Faculty of Informatic - Paper (Archive) Faculty of Engineering and Information Science 200 An efficient reource allocation algorithm for OFDMA cooperative relay network
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution
More informationTexture-Constrained Active Shape Models
107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.
More information