467 Hits in 4.8 sec

The Review of GKS version 7.0, The Finishing Touch

P.J.W. Hagen
1982 Computer graphics forum (Print)  
is the FILL AREA primitive.  ...  For FILL AREA the PATTERN SIZE and REFERENCE POINT have the same function. In table 2 the attributes are ordered per primitive in the four groups mentioned above.  ...  ACKNOWLEDGEMENT My thanks to David Rosenthal for a critical review of this paper.  ... 
doi:10.1111/j.1467-8659.1982.tb00056.x fatcat:ug2siwzthfey7j3llij7kgb7ca

TeX and graphics : The State of the Problem

Nelson H.F. Beebe
1989 Cahiers GUTenberg  
There are no filled areas, so the common publishing technique of shading text, boxes for emphasis is unavailable.  ...  If TgX had a grey-scale primitive that supplied an intensity for rules (filled rectangles), then it would be simple in these bar charts to draw a white rule covering the legend area, erasing anything already  ... 
doi:10.5802/cg.22 fatcat:wolrvtl2unartnuu7oz4wakaoy

Web 2D Graphics: State-of-the-Art [article]

David Duce, Ivan Herman, Bob Hopgood
2001 Eurographics State of the Art Reports  
The early browsers for the Web were predominantly aimed at retrieval of textual information.  ...  In January 1993, the Mosaic browser was released by NCSA. The browser was simple to download and, by the Autumn of 1993, was available for X workstations, PCs and the Mac.  ...  The user agent will fill the missing colour areas with a linear or radial interpolation of the colours.  ... 
doi:10.2312/egst.20011047 fatcat:qei5dnzw7zg5rfxbhdjimkm2vi

PAW — Towards a physics analysis workstation

R. Bock, R. Brun, O. Couet, J.C. Marin, R. Nierhaus, L. Pape, N. Saumon, C. Vandoni, P. Zanarini
1987 Computer Physics Communications  
It combines the best features and the experience acquired with the existing systems together with the user friendliness now possible on modern workstations.  ...  The advent of personal workstations with their good response time and powerful graphics capabilities is making these systems even more popular. PAW has been designed in that spirit.  ...  Different fonts, area filling, been included into a new version.  ... 
doi:10.1016/0010-4655(87)90154-8 fatcat:tq7tuxqnifeffp5oa6qiknel2q

Web 2D Graphics File Formats

David Duce, Ivan Herman, Bob Hopgood
2002 Computer graphics forum (Print)  
The paper concludes with reflections on the current state of this area and future prospects.  ...  For a significant range of applications, image graphics has severe limitations, for example in terms of file size, download time and inability to interact with and modify the graphics client-side.  ...  The inputs to a primitive are either the source image (i.e. produced by previous SVG operations) or the output of another primitive; the output of the last primitive is displayed on the screen.  ... 
doi:10.1111/1467-8659.00565 fatcat:3irmf5eq6rh65g5t65kg4sls4y

A Vector-like Architecture for Raster Graphics [article]

Varol Akman, Paul Ten Hagen, Fons Kuijk
1987 Proceedings of the ACM SIGGRAPH/EUROGRAPHICS conference on Graphics hardware - HWWS '04  
total burden, with each processor taking responsibility for part of the work.  ...  Our work is decidedly in contrast with several current research efforts in the area of graphics hardware where it is commonplace to simply put several processors into a cooperative effort to share the  ...  for NP-complete prob lems by running a bounded (in the problem size) number of processors in parallel.  ... 
doi:10.2312/eggh/eggh87/137-152 fatcat:u4oqqza2lrhfhnmp55l4mgmo3a

Group Key Managements in Wireless Sensor Networks [chapter]

Ju-hyung Son, Seung-woo Seo, Seung-woo Seo
2010 Sustainable Wireless Sensor Networks  
A sensor network operating in open environments requires a network-wide group key for confidentiality of exchanged messages between sensor nodes.  ...  The major concern of this group key update procedure will be the multi-hop communication overheads of the rekeying messages due to the energy constraints of sensor nodes.  ...  For the broadcast authenticity, we need new security primitives called broadcast authentication.  ... 
doi:10.5772/13186 fatcat:jdbuqrnlnzchlkjgkrlvgy6rsi

Real-time Unsupervised Segmentation of human whole-body motion and its application to humanoid robot acquisition of motion symbols

Wataru Takano, Yoshihiko Nakamura
2016 Robotics and Autonomous Systems  
Each derived motion primitive is classified into an HMM for a motion symbol, and parameters of the HMMs are optimized by using the motion primitives as training data in competitive learning.  ...  However, to determine the motion primitives to use as training data for the HMMs, this framework requires a manual segmentation of human motions.  ...  Acknowledgment This research was partially supported by a Grant-in-Aid for Young Scientists (A) (No. 26700021) from the Japan Society for the Promotion of Science, and by the Strategic Information and  ... 
doi:10.1016/j.robot.2015.09.021 fatcat:czvq4ewahrgrpj263wvp32a4na

Reducing the Overhead of BCH Codes: New Double Error Correction Codes

Luis-J. Saiz-Adalid, Joaquín Gracia-Morán, Daniel Gil-Tomás, J.-Carlos Baraza-Calvo, Pedro-J. Gil-Vicente
2020 Electronics  
Primitive BCH codes only exist for some word lengths, which do not frequently match those employed in digital systems.  ...  We used a methodology to search parity check matrices, based on error patterns, in order to design the new codes.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.  ... 
doi:10.3390/electronics9111897 fatcat:3hwx4kpsfrdejfz7vezlwop66m

AHA! an 'Artificial Hippocampal Algorithm' for Episodic Machine Learning [article]

Gideon Kowadlo, Abdelrahman Ahmed, David Rawlinson
2020 arXiv   pre-print
The new knowledge can then be used to distinguish between similar experiences, to generalise between classes, and to selectively consolidate to long-term memory.  ...  The Hippocampus is known to be vital to these abilities. AHA is a biologically-plausible computational model of the Hippocampus.  ...  We also greatly appreciate the insight that Rotem Aharon provided in analysing and improving the dynamics of Hopfield networks.  ... 
arXiv:1909.10340v5 fatcat:35bzsqnponesflsvqlhg576wwq

SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes

Bander A. Alzahrani, Ahmed Barnawi, Abdullah Albarakati, Azeem Irshad, Muhammad Asghar Khan, Shehzad Ashraf Chaudhry, Hasan Ali Khattak
2022 Wireless Communications and Mobile Computing  
An improved scheme using symmetric key functions for SH (SKIA-SH) is proposed in this paper.  ...  Being one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles.  ...  RG-3-611-41. e authors, therefore, acknowledge with thanks the DSR for technical and financial support.  ... 
doi:10.1155/2022/8669941 fatcat:o2xgxyztcjcbvegweksxuo6zui

Multidimensional upwind schemes and higher resolution methods for three-component two-phase systems including gravity driven flow in porous media on unstructured grids

Sadok Lamine, Michael G. Edwards
2015 Computer Methods in Applied Mechanics and Engineering  
The multidimensional methods reduce crosswind diffusion inherent in standard methods for convective flow approximation in porous media.  ...  Comparison is drawn between the methods.  ...  All water saturation and concentration contours are shown at the same output time 0.5 PVI. A CFL of 0.6 is used for the first order method.  ... 
doi:10.1016/j.cma.2014.12.022 fatcat:pzawejpjdvgy3njlwpwc7efome

Identifying Key Leakage of Bitcoin Users [chapter]

Michael Brengel, Christian Rossow
2018 Lecture Notes in Computer Science  
Then, we focus on implicit key leakage by exploiting the wrong usage of cryptographic primitives and scan Bitcoin's blockchain for ECDSA nonce reuse.  ...  We systematically outline how an attacker can use duplicate r values to leak nonces and secret keys, which goes beyond the simple case where the same nonce and the same key have been used in conjunction  ...  This work was supported by the European Union's Horizon 2020 research and innovation programme, RAMSES, under grant agreement No. 700326.  ... 
doi:10.1007/978-3-030-00470-5_29 fatcat:uk2ete73abb5vmxdujdyk55iki


Norman I. Badler, Ingrid Carlbom
1984 Eurographics State of the Art Reports  
The directions of professional activities, hardware, software, and algorithms are outlined.  ...  We briefly survey the major thrusts of computer graphics activities, examining trends and topics rather than offering a comprehensive survey of all that is happening.  ...  The authors would like to thank Ron Benvenutti at Schlumberger-Doll Research for his help with the section on personal graphics. Refereace8  ... 
doi:10.2312/eg.19841014 fatcat:orfctp5tjfgh5e36pqp4syglw4

Coordination of distributed/parallel multiple-grid domain decomposition [chapter]

C. T. H. Everaars, F. Arbab
1996 Lecture Notes in Computer Science  
A w orkable approach for the solution of many (numerical and non-numerical) problems is domain decomposition.  ...  The multiple-grid domain decomposition method used in this paper is based on adaptive partitioning of the domain and results in highly irregular grids as shown in the examples.  ...  New estimates for the lowest value of z in each of these sub-domains, recursively, narrow this search process further and further into smaller and smaller regions that (hopefully) tend towards the area  ... 
doi:10.1007/bfb0030103 fatcat:bzyf3a73x5gpnlvc3b7emdnz7q
« Previous Showing results 1 — 15 out of 467 results