We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Abstract-This paper describes a method for constructing isosurface triangulations of sampled, volumetric, three-dimensional scalar fields. The resulting meshes consist of triangles...
Direct volume rendering o ers the opportunity to visualize all of a three-dimensional sample volume in one image. However, processing such images can be very expensive and good qu...
A scalable video coder generates scalable compressed bitstream, which can provide different types of scalability depend on different requirements. This paper proposes a novel resy...
We present two complementary methods for automatically improving mesh parameterizations and demonstrate that they provide a very desirable combination of efficiency and quality. ...