Essays about: "Boolean Operations"

Showing result 1 - 5 of 6 essays containing the words Boolean Operations.

  1. 1. Analysis of Mutable Game Environments Built on a Tetrahedral Mesh : Tetras, a Potential Alternative to Voxels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Noah Tell; [2023]
    Keywords : Voxels; Tetrahedron; Tetrahedral Mesh; Tetrahedralization; Tessellation; Mutable Environment; Editable Terrain; Deformable Environment; Boolean Operations; Real-Time; Computer Games; Computational Geometry; Voxlar; Tetrahedror; Tetrahedralisering; Tessellering; Formbar Terräng; Booliska Operationer; Realtid; Datorspel; Beräkningsgeometri;

    Abstract : Historically 3D game environments have almost always been immutable. Mutable environments are a technical challenge that will affect performance. For games of the future to continue approaching realism, mutable environments are an essential step. READ MORE

  2. 2. Parallelization of boolean operations for CAD Software using WebGPU

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Max Helmrich; Linus Käll; [2023]
    Keywords : Parallelization; Web; Boolean Operations; WebGPU; CAD; GPU Acceleration;

    Abstract : This project is about finding ways to improve performance of a Computer-Aided-Design (CAD) application running in the web browser. With the new Web API WebGPU, it is now possible to use the GPU to accelerate calculations for CAD applications in the web. READ MORE

  3. 3. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Augustin Bariant; [2023]
    Keywords : Bitslicing; Cryptography; Whitebox; Compilation; Boolean circuits.; Parallélisation au bit; Cryptographie; Boîte blanche; Compilation; Circuits booléens.; Bitslicing; Kryptografi; Vit låda; Kompilering; Booleska kretsar.;

    Abstract : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. READ MORE

  4. 4. Evaluating performance of homomorphic encryption applied on delta encoding

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : János Richard Dani; [2022]
    Keywords : homomorphic encryption; delta encoding; performance test;

    Abstract : Homomorphic encryption is an encryption scheme that allows for simple operations on encrypted data. These operations are mainly boolean circuits combined into more complexarithmetic operations, rotations, and others. Homomorphic encryption was first implemented in 2009, and in the following decade, many different versions emerged. READ MORE

  5. 5. Transition Space

    University essay from KTH/Arkitektur

    Author : Zhongyu Jiang; [2018]
    Keywords : library; transition; image;

    Abstract : The project is the expansion of the Stockholm public library. Engaging in study from the misconstrued translations of images, a "transition space" next to the old library. There are four aspects of interpretation for the word "transition" in my project: path, shape, type and memory. READ MORE