نتایج جستجو برای: under bounding

تعداد نتایج: 1058225  

Journal: :Journal of High Energy Physics 2023

The entanglement wedge cross sections (EWCSs) are postulated as dual gravity probes to certain measures for the of multiparty systems. We test various proposed inequalities EWCSs. As it turns out, contrary expectations, EWCS is not clearly monogamous nor polygamous tripartite systems but results depend on details and dimensionality geometry solutions. propose weaker monogamy relations measures,...

2009
René Weller Gabriel Zachmann

We present a novel geometric data structure for approximate collision detection at haptic rates between rigid objects. Our data structure, which we call inner sphere trees, supports different kinds of queries, namely, proximity queries and a new method for interpenetration computation, the penetration volume, which is related to the water displacement of the overlapping region and, thus, corres...

2005
Mankyu Sung Stephen Chenney Michael Gleicher

In this paper we consider detecting collisions between characters whose motion is specified by motion capture data. We consider rough collisions, modeling the characters as a disk in the floor plane. To provide efficient collision detection, we introduce a hierarchical bounding volume, the Motion Oriented Bounding Box tree (MOBB tree). A MOBBtree stores space-time bounds of a motion clip. In cr...

Journal: :Journal of Economic Psychology 2003

Journal: :South African Journal of Radiology 2005

Journal: :Proceedings of the American Mathematical Society 2011

Journal: :Fortschritte der Physik 2020

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2004
Greg Byrne Robert Gilmore Christophe Letellier

We establish conditions for distinguishing between two topologically identical strange attractors that are enclosed by identical bounding tori, one of which is generated by a flow restricted to that torus, the other of which is generated by a flow in a different bounding torus and either imaged or lifted into the first bounding torus.

2015
Serge Vaudenay

Distance-Bounding is used to defeat relay attacks. For wireless payment systems, the payment terminal is not always online. So, the protocol must rely on a public key for the prover (payer). We propose a generic transformation of a (weakly secure) symmetric distance bounding protocol which has no postverification into wide-strong-private and secure public-key distance bounding.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید