Sciweavers

2223 search results - page 390 / 445
» Hierarchical Morphable Models
Sort
View
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 10 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
141
Voted
COMPGEOM
2004
ACM
15 years 10 months ago
Approximate convex decomposition of polygons
We propose a strategy to decompose a polygon, containing zero or more holes, into “approximately convex” pieces. For many applications, the approximately convex components of ...
Jyh-Ming Lien, Nancy M. Amato
MMDB
2004
ACM
136views Multimedia» more  MMDB 2004»
15 years 10 months ago
A motion based scene tree for browsing and retrieval of compressed videos
This paper describes a fully automatic content-based approach for browsing and retrieval of MPEG-2 compressed video. The first step of the approach is the detection of shot bound...
Haoran Yi, Deepu Rajan, Liang-Tien Chia
SACMAT
2004
ACM
15 years 10 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
AMDO
2004
Springer
15 years 10 months ago
Variant Design in Immersive Virtual Reality: A Markup Language for Scalable CSG Parts
In many product areas, a growing trend can be observed towards variant design, i.e. the development of customized designs based on variations of mature product models. We have deve...
Peter Biermann, Bernhard Jung