Search results
-
-
Title
-
A Growth-Based Approach to the Automatic Generation of Navigation Meshes
-
Author
-
Hale, David
-
Date Created
-
2011
-
Description
-
Providing an understanding of space in game and simulation environments is one of the major challenges associated with moving artificially intelligent characters through these environments. The usage of some form of navigation mesh has become the ...
-
-
Title
-
A Growth-Based Approach to the Automatic Generation of Navigation Meshes
-
Author
-
Hale, David
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science
-
Description
-
Providing an understanding of space in game and simulation environments is one of the major challenges associated with moving artificially intelligent characters through these environments. The usage of some form of navigation mesh has become the ...
-
-
Title
-
A Secure SoC Platform For Security Assessments In FPGASs
-
Author
-
Nicholas, Geraldine Shirley
-
Date Created
-
2023
-
Subjects--Topical
-
Electrical engineering
-
Description
-
With the rapid increase in connected devices and SoC design architecture being usedin diverse platforms, they become potential targets to gain unauthorized access for data and privacy invasion. Therefore, heterogeneous SoC architecture raises secu...
-
-
Title
-
Average Genus of Oriented Rational Links
-
Author
-
Ray, Dawn
-
Date Created
-
2022
-
Subjects--Topical
-
Mathematics
-
Description
-
The goal of this dissertation is to develop the formulation of the average minimal genus of all reduced alternating rational links with a given crossing number. Work has been done by N. Dunfield to approximate the growth of the genus of knots with...
-
-
Title
-
Binary Edwards Curves in Elliptic Curve Cryptography
-
Author
-
Enos, Graham
-
Date Created
-
2013
-
Description
-
Edwards curves are a new normal form for elliptic curves that exhibit some cryptographically desirable properties and advantages over the typical Weierstrass form. Because the group law on an Edwards curve (normal, twisted, or binary) is complete ...
-
-
Title
-
Binary Edwards Curves in Elliptic Curve Cryptography
-
Author
-
Enos, Graham
-
Date Created
-
2013
-
Description
-
Edwards curves are a new normal form for elliptic curves that exhibit some cryptographically desirable properties and advantages over the typical Weierstrass form. Because the group law on an Edwards curve (normal, twisted, or binary) is complete ...
-
-
Title
-
Binary Edwards Curves in Elliptic Curve Cryptography
-
Author
-
Enos, Graham
-
Date Created
-
2013
-
Subjects--Topical
-
Mathematics
-
Description
-
Edwards curves are a new normal form for elliptic curves that exhibit some cryptographically desirable properties and advantages over the typical Weierstrass form. Because the group law on an Edwards curve (normal, twisted, or binary) is complete ...
-
-
Title
-
Braid Indices in a Class of Closed Braids
-
Author
-
Hinson, Kenneth
-
Date Created
-
2010
-
Description
-
A long-standing problem in knot theory concerns the additivity of crossing numbers of links under the connected sum operation. It is conjectured that if L1 and L2 are links, then Cr(L1#L2)=Cr(L1)+Cr(L2), but so far this has been proved only for ce...
-
-
Title
-
Braid Indices in a Class of Closed Braids
-
Author
-
Hinson, Kenneth
-
Date Created
-
2010
-
Subjects--Topical
-
Mathematics
-
Description
-
A long-standing problem in knot theory concerns the additivity of crossing numbers of links under the connected sum operation. It is conjectured that if L1 and L2 are links, then Cr(L1#L2)=Cr(L1)+Cr(L2), but so far this has been proved only for ce...
-
-
Title
-
Effective Data Parallel Computing on Multicore Processors
-
Author
-
Byun, Jong-Ho
-
Date Created
-
2010
-
Description
-
The rise of chip multiprocessing or the integration of multiple general purpose processing cores on a single chip (multicores), has impacted all computing platforms including high performance, servers, desktops, mobile, and embedded processors. Pr...
-
-
Title
-
Effective Data Parallel Computing on Multicore Processors
-
Author
-
Byun, Jong-Ho
-
Date Created
-
2010
-
Subjects--Topical
-
Computer science, Computer engineering
-
Description
-
The rise of chip multiprocessing or the integration of multiple general purpose processing cores on a single chip (multicores), has impacted all computing platforms including high performance, servers, desktops, mobile, and embedded processors. Pr...
-
-
Title
-
Improved Bounds on a Combinatorial Problem
-
Author
-
Page, Jacob
-
Date Created
-
2021
-
Description
-
In this paper, we will define a function $H:\N \rightarrow \N$, whose output is the size of an optimized hypergraph based upon the restraints given by its input values. This function is known to be well-defined, however its values are unknown for ...
-
-
Title
-
Improved Bounds on a Combinatorial Problem
-
Author
-
Page, Jacob
-
Date Created
-
2021
-
Subjects--Topical
-
Mathematics
-
Description
-
In this paper, we will define a function $H:\N \rightarrow \N$, whose output is the size of an optimized hypergraph based upon the restraints given by its input values. This function is known to be well-defined, however its values are unknown for ...
-
-
Title
-
Number Rings and Dedekind Domains
-
Author
-
Harrison, Mary
-
Date Created
-
2019
-
Description
-
In this paper, we study number rings and their factorization properties. We begin with an introduction to number fields and number rings. Then we consider the ring Z[i], which is a unique factorization domain, where each element factors uniquely i...
-
-
Title
-
Number Rings and Dedekind Domains
-
Author
-
Harrison, Mary
-
Date Created
-
2019
-
Subjects--Topical
-
Mathematics
-
Description
-
In this paper, we study number rings and their factorization properties. We begin with an introduction to number fields and number rings. Then we consider the ring Z[i], which is a unique factorization domain, where each element factors uniquely i...
-
-
Title
-
QUANTUM RESISTANT REED-MULLER CODES ON McELIECE CRYPTOSYSTEM
-
Author
-
Elder, Jasmine
-
Date Created
-
2020
-
Description
-
Recently, Dr. Wang presented a new post quantum encryption scheme, Random Linear Code-Based Encryption scheme, RLCE, which is a variant to the McEliece encryption scheme. It is already well-known that the McEliece Encryption scheme based upon Reed...
-
-
Title
-
QUANTUM RESISTANT REED-MULLER CODES ON McELIECE CRYPTOSYSTEM
-
Author
-
Elder, Jasmine
-
Date Created
-
2020
-
Subjects--Topical
-
Mathematics, Information science
-
Description
-
Recently, Dr. Wang presented a new post quantum encryption scheme, Random Linear Code-Based Encryption scheme, RLCE, which is a variant to the McEliece encryption scheme. It is already well-known that the McEliece Encryption scheme based upon Reed...
-
-
Title
-
Writhe-like Invariants of Alternating Links
-
Author
-
Pham, Van
-
Date Created
-
2022
-
Subjects--Topical
-
Mathematics
-
Description
-
This dissertation introduces new invariants for a large class of links in knot theory, called alternating links. It also analyzes the strength of these invariants, that we call writhe-like invariants, in comparison with a few general link invarian...