Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
We introduce an image retrieval method for searchingan image database by using a query image that has similarity in its global and/or regional image contents to the intended targe...
The use of detailed geometric models is a critical factor for achieving realism in most computer graphics applications. In the past few years, we have observed an increasing deman...
A review of the facts about human stereo vision leads to the conclusion that the human stereo processing mechanism is very flexible in the presence of other depth cues. Stereopsis ...
The existing telecommunications infrastructure in most of the world is adequate to deliver voice and text applications, but demand for broadband services such as streaming video an...
Yann d'Halluin, Peter A. Forsyth, Kenneth R. Vetza...