Sciweavers

1509 search results - page 177 / 302
» Building Shape Models from Lousy Data
Sort
View
TOG
2002
128views more  TOG 2002»
15 years 3 months ago
Modelling with implicit surfaces that interpolate
We introduce new techniques for modelling with interpolating implicit surfaces. This form of implicit surface was first used for problems of surface reconstruction [24] and shape ...
Greg Turk, James F. O'Brien
139
Voted
VVS
1998
IEEE
107views Visualization» more  VVS 1998»
15 years 8 months ago
Edge Preservation in Volume Rendering Using Splatting
: This paper presents a method to preserve sharp edge details in splatting for volume rendering. Conventional splatting algorithms produce fuzzy images for views close to the volum...
Jian Huang, Roger Crawfis, Don Stredney
CGVR
2006
15 years 5 months ago
Development of Stereoscopic Image Editing Tool using Image-Based Modeling
- In recent years, techniques have shown an increased interest in research and development related to stereoscopic imaging. However, unlike 2D image, stereoscopic image is generate...
Chang Ok Yun, Sang Heon Han, Tae Soo Yun, Dong Hoo...
117
Voted
DIS
2004
Springer
15 years 9 months ago
Predictive Graph Mining
Abstract. Graph mining approaches are extremely popular and effective in molecular databases. The vast majority of these approaches first derive interesting, i.e. frequent, patte...
Andreas Karwath, Luc De Raedt
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 10 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai