نتایج جستجو برای: rotational cube technique

تعداد نتایج: 649049  

1999
Andreas Hubeli Lars Lippert Markus Gross A. Hubeli M. Gross

In this paper we introduce the notion of the global cube algorithm. Its concept and its implementation allow the computation of the energy transfer of light in a volumetric medium by exploiting graphics hardware. Until now, volumetric radiosity techniques are limited to compute the equilibrium of energy for a maximum of a few tens of thousand volume elements due to the complexity of the underly...

Journal: :IJDWM 2015
Doulkifli Boukraâ Mohammed Amin Bouchoukh Omar Boussaïd

In this paper, the authors present an approach to efficiently compress XML OLAP cubes. They propose a multidimensional snowflake schema of the cube as the basic physical configuration. The cube is then composed of one XML fact document and as many XML documents as the dimension hierarchy members. The basic configuration is reorganized into two ways by adding data redundancy on purpose in order ...

2005
Kongfa Hu Ling Chen Qi Gu Bin Li Yisheng Dong

Data cube has been playing an essential role in fast OLAP(on-line analytical processing) in many multidimensional data warehouse. We often execute range queries on aggregate cube computed by pre-aggregate technique in MOLAP. For the cube with d dimensions, it can generate 2 cuboids. But in a high-dimensional data warehouse (such as the applications of bioinformatics and statistical analysis, et...

1998
James P. Brody Stephen R. Quake

A technique to measure microscopic rotational motion is presented. When a small fluorescent polystyrene microsphere is attached to a larger polystyrene microsphere, the larger sphere acts as a lens for the smaller microsphere and provides an optical signal that is a strong function of the azimuthal angle. We demonstrate the technique by measuring the rotational diffusion constant of the microsp...

2016
Kaustuv Chaudhuri Sonia Marin Lutz Straßburger

Focusing is a general technique for syntactically compartmentalizing the non-deterministic choices in a proof system, which not only improves proof search but also has the representational benefit of distilling sequent proofs into synthetic normal forms. However, since focusing is usually specified as a restriction of the sequent calculus, the technique has not been transferred to logics that l...

2015
Pier Francesco Indelli Angelo Graceffa Andrea Baldini Brielle Payne Gennaro Pipino Massimiliano Marcucci

This study evaluated the influence of modern tibial baseplate designs when using the anterior tibial cortex as a primary rotational landmark for the tibial baseplate in TKA. Eighty patients undergoing TKA were randomized in two groups. Group 1 included 25 females and 15 males receiving a posterior-stabilized (PS) symmetric tibial baseplate while Group 2 included 24 females and 16 males receivin...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1971
J Maniloff

The helical ribosome structures of Mycoplasma gallisepticum have been analyzed by optical diffraction and the rotational symmetry technique. The helix repeat (510 A) is composed of 10 ribosomes in 3 turns. The rotational studies show some ribosome fine structure.

Journal: :Higher-Order and Symbolic Computation 1999
Gilles Barthe John Hatcliff Morten Heine Sørensen

Continuation passing style (CPS) translations of typed -calculi numerous applications. However, the range of these applications is con ned by the fact that CPS translations are known for nondependent type systems only, thus excluding well-known systems like the calculus of constructions (CC) and the logical frameworks (LF). This paper presents techniques for CPS translating systems with depende...

2006
S. G. WILLIAMSON

In an extensive class of combinatorial problems concerned with the enumeration of labelled structures (graphs, trees, regular polyhedra with labelled edges, vertices, faces, etc.), one is concerned with the action of a finite group G on a set R of functions (domain D = {1, 2, ..., d), range R = {1, ..., r}) [1, 2]. For example, if D = {1, ...,6} is regarded as the six faces of a cube and R — {1...

Journal: :IACR Cryptology ePrint Archive 2017
Qingju Wang Yonglin Hao Yosuke Todo Chaoyun Li Takanori Isobe Willi Meier

The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especially for stream ciphers. Aiming at recovering some secret key bits, the adversary reconstructs a superpoly with the secret key bits involved, by summing over a set of the plaintexts/IV which is called a cube. Traditional cube attack only exploits linear/quadratic superpolies. Moreover, for a long ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید