Sciweavers

101 search results - page 11 / 21
» Extended visual cryptography schemes
Sort
View
70
Voted
EUROCRYPT
2005
Springer
15 years 3 months ago
Mercurial Commitments with Applications to Zero-Knowledge Sets
We introduce a new flavor of commitment schemes, which we call mercurial commitments. Informally, mercurial commitments are standard commitments that have been extended to allow ...
Melissa Chase, Alexander Healy, Anna Lysyanskaya, ...
70
Voted
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
15 years 3 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
73
Voted
ICRA
2003
IEEE
119views Robotics» more  ICRA 2003»
15 years 2 months ago
Path-dependent gaze control for obstacle avoidance in vision guided humanoid walking
Abstract— This article presents a novel gaze control strategy for obstacle avoidance in the context of vision guided humanoid walking. The generic strategy is based on the maximi...
Javier F. Seara, Klaus H. Strobl, Günther Sch...
VISUALIZATION
1998
IEEE
15 years 1 months ago
Smooth view-dependent level-of-detail control and its application to terrain rendering
The key to real-time rendering of large-scale surfaces is to locally adapt surface geometric complexity to changing view parameters. Several schemes have been developed to address...
Hugues Hoppe
87
Voted
EDUTAINMENT
2008
Springer
14 years 11 months ago
Knowledge Discovery by Network Visualization
Hyperlinks among webpages are very important information and are widely used for webpage clustering and webpage ranking. With the explosive growth in the number of webpages availab...
Hong Zhou, Yingcai Wu, Ming-Yuen Chan, Huamin Qu, ...