Sciweavers

5948 search results - page 1006 / 1190
» Computing Robust Counter-Strategies
Sort
View
132
Voted
SMI
2007
IEEE
139views Image Analysis» more  SMI 2007»
15 years 10 months ago
Texture Atlas Generation for Inconsistent Meshes and Point Sets
In order to compute texture atlases with low stretch and hardly visible texture seams existing texture mapping tools pose high demands on the quality of surface representations li...
Patrick Degener, Reinhard Klein
148
Voted
SMI
2007
IEEE
157views Image Analysis» more  SMI 2007»
15 years 10 months ago
Skeleton-based Hierarchical Shape Segmentation
We present an effective framework for segmenting 3D shapes into meaningful components using the curve skeleton. Our algorithm identifies a number of a critical points on the curv...
Dennie Reniers, Alexandru Telea
115
Voted
WACV
2007
IEEE
15 years 10 months ago
A Vision System for Monitoring Intermodal Freight Trains
We describe the design and implementation of a vision based Intermodal Train Monitoring System(ITMS) for extracting various features like length of gaps in an intermodal(IM) train...
Avinash Kumar, Narendra Ahuja, John M. Hart, Vises...
133
Voted
WACV
2007
IEEE
15 years 10 months ago
A Two-stage Algorithm for Shoreline Detection
Shoreline detection plays an important role in vision based navigation for autonomous surface vehicles (ASVs). It is a challenging task because of the diversity in near-bank scena...
Xiaojin Gong, Anbumani Subramanian, Christopher L....
140
Voted
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
15 years 10 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa
« Prev « First page 1006 / 1190 Last » Next »