Sciweavers

3707 search results - page 686 / 742
» A Simple Technique for Self-Calibration
Sort
View
SI3D
2005
ACM
15 years 3 months ago
Volume catcher
It is difficult to obtain a specific region within unsegmented volume data (region of interest, ROI). The user must first segment the volume, a task which itself involves signi...
Shigeru Owada, Frank Nielsen, Takeo Igarashi
SIGSOFT
2005
ACM
15 years 3 months ago
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unawar...
Zhenmin Li, Yuanyuan Zhou
CAIP
2005
Springer
15 years 3 months ago
Virtual Garment Pre-positioning
In this paper, we present an easy method for automatic 3D garment pre-positioning. Given a digital 3D mannequin and a set of 2D patterns, the problem consists in sewing automatical...
Tung Le Thanh, André Gagalowicz
CCS
2005
ACM
15 years 3 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 3 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay