Sciweavers

7168 search results - page 1420 / 1434
» A Factorization Approach to Grouping
Sort
View
JOC
2000
181views more  JOC 2000»
14 years 9 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
MVA
2002
178views Computer Vision» more  MVA 2002»
14 years 9 months ago
Advanced Image Retrieval Using Multi-resolution Image Content
We introduce an image retrieval method for searchingan image database by using a query image that has similarity in its global and/or regional image contents to the intended targe...
Motohide Yoshimura, Hajime Kiyose, Shigeo Abe
RITA
2002
110views more  RITA 2002»
14 years 9 months ago
Modeling and Rendering of Real Environments
The use of detailed geometric models is a critical factor for achieving realism in most computer graphics applications. In the past few years, we have observed an increasing deman...
Wagner Toledo Corrêa, Manuel M. Oliveira, Cl...
TSMC
1998
122views more  TSMC 1998»
14 years 9 months ago
Dynamic adjustment of stereo display parameters
A review of the facts about human stereo vision leads to the conclusion that the human stereo processing mechanism is very flexible in the presence of other depth cues. Stereopsis ...
Colin Ware, Cyril Gobrecht, Mark Andrew Paton
TON
2002
116views more  TON 2002»
14 years 9 months ago
Managing capacity for telecommunications networks under uncertainty
The existing telecommunications infrastructure in most of the world is adequate to deliver voice and text applications, but demand for broadband services such as streaming video an...
Yann d'Halluin, Peter A. Forsyth, Kenneth R. Vetza...
« Prev « First page 1420 / 1434 Last » Next »