![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
On Constrained Minimum Pseudotriangulations
In this paper, we show some properties of a pseudotriangle and present three combinatorial bounds: the ratio of the size of minimum pseudotriangulation of a point set S and the size of minimal pseudotriangulation...
-
Chapter and Conference Paper
The Geometric Constraint Solving Based on Mutative Scale Chaos Genetic Algorithm
The constraint problem can be transformed to an optimization problem. In this paper a new hybrid algorithm—MSCGA was introduced which mixes genetic algorithm with chaos optimization method. The character of th...
-
Chapter and Conference Paper
Factoring-Based Proxy Signature Schemes with Forward-Security
The property of forward-security can be used to reduce the potential damages caused by key exposure. However, none of the existing proxy signature schemes has taken forward-security into consideration. And mos...
-
Chapter and Conference Paper
Key Management for Secure Multicast Using the RingNet Hierarchy
We propose a novel multicast communications model using a RingNet hierarchy, called the RingNet model, which is a combination of logical trees and logical rings for multicast communications. The RingNet hierar...
-
Chapter and Conference Paper
A New Algebraic-Based Geometric Constraint Solving Approach: Path Tracking Homotopy Iteration Method
Geometric constraint problem is equivalent to the problem of solving a set of nonlinear equations substantially. Nonlinear equations can be solved by classical Newton-Raphson algorithm. Path tracking is the it...