Sciweavers

855 search results - page 151 / 171
» Analysis of Surfaces Using Constrained Regression Models
Sort
View
61
Voted
WWW
2007
ACM
15 years 10 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
OR
2010
Springer
14 years 8 months ago
Modeling organic carbon and carbon-mediated soil processes in DSSAT v4.5
Cropping systems models have evolved over the last four decades in response to the demand for modeling to address more complex questions, including issues on sustainable productio...
Cheryl H. Porter, J. W. Jones, S. Adiku, A. J. Gij...
EGITALY
2006
14 years 11 months ago
Recovering 3D architectural information from dense digital models of buildings
In recent years the progress of 3D scanning technologies and the consequent growing commercialization of scanners opened a large spectrum of opportunities for many professionals. ...
A. Spinelli, Fabio Ganovelli, Claudio Montani, Rob...
CRV
2008
IEEE
118views Robotics» more  CRV 2008»
15 years 4 months ago
Generating Semantic Information from 3D Scans of Crime Scenes
Recent advancements in laser and visible light sensor technology allows for the collection of photorealistic 3D scans of large scale spaces. This enables the technology to be used...
Anna Topol, Michael Jenkin, Jarek Gryz, Stephanie ...
SMI
2003
IEEE
223views Image Analysis» more  SMI 2003»
15 years 2 months ago
Skeleton Extraction of 3D Objects with Radial Basis Functions
Skeleton is a lower dimensional shape description of an object. The requirements of a skeleton differ with applications. For example, object recognition requires skeletons with pr...
Wan-Chun Ma, Fu-Che Wu, Ming Ouhyoung