Sökning: "Boolean Operations"

Visar resultat 1 - 5 av 6 uppsatser innehållade orden Boolean Operations.

  1. 1. Analysis of Mutable Game Environments Built on a Tetrahedral Mesh : Tetras, a Potential Alternative to Voxels

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Noah Tell; [2023]
    Nyckelord :Voxels; Tetrahedron; Tetrahedral Mesh; Tetrahedralization; Tessellation; Mutable Environment; Editable Terrain; Deformable Environment; Boolean Operations; Real-Time; Computer Games; Computational Geometry; Voxlar; Tetrahedror; Tetrahedralisering; Tessellering; Formbar Terräng; Booliska Operationer; Realtid; Datorspel; Beräkningsgeometri;

    Sammanfattning : Historically 3D game environments have almost always been immutable. Mutable environments are a technical challenge that will affect performance. For games of the future to continue approaching realism, mutable environments are an essential step. LÄS MER

  2. 2. Parallelization of boolean operations for CAD Software using WebGPU

    Master-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Max Helmrich; Linus Käll; [2023]
    Nyckelord :Parallelization; Web; Boolean Operations; WebGPU; CAD; GPU Acceleration;

    Sammanfattning : This project is about finding ways to improve performance of a Computer-Aided-Design (CAD) application running in the web browser. With the new Web API WebGPU, it is now possible to use the GPU to accelerate calculations for CAD applications in the web. LÄS MER

  3. 3. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Augustin Bariant; [2023]
    Nyckelord :Bitslicing; Cryptography; Whitebox; Compilation; Boolean circuits.; Parallélisation au bit; Cryptographie; Boîte blanche; Compilation; Circuits booléens.; Bitslicing; Kryptografi; Vit låda; Kompilering; Booleska kretsar.;

    Sammanfattning : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. LÄS MER

  4. 4. Evaluating performance of homomorphic encryption applied on delta encoding

    Master-uppsats, Linköpings universitet/Databas och informationsteknik

    Författare :János Richard Dani; [2022]
    Nyckelord :homomorphic encryption; delta encoding; performance test;

    Sammanfattning : Homomorphic encryption is an encryption scheme that allows for simple operations on encrypted data. These operations are mainly boolean circuits combined into more complexarithmetic operations, rotations, and others. Homomorphic encryption was first implemented in 2009, and in the following decade, many different versions emerged. LÄS MER

  5. 5. Transition Space

    Master-uppsats, KTH/Arkitektur

    Författare :Zhongyu Jiang; [2018]
    Nyckelord :library; transition; image;

    Sammanfattning : The project is the expansion of the Stockholm public library. Engaging in study from the misconstrued translations of images, a "transition space" next to the old library. There are four aspects of interpretation for the word "transition" in my project: path, shape, type and memory. LÄS MER