Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
The irradiance at a point on a surface due to a polyhedral source of uniform brightness is given by a well-known analytic formula. In this paper we derive the corresponding analyt...
We show how to build hierarchical, reduced-rank representation for large stochastic matrices and use this representation to design an efficient algorithm for computing the largest...
Automatic shape acquisition technologies evolved rapidly in recent years, and huge mass of 3D data can be easily produced. The high accuracy of range scanning technology makes the...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...