Sciweavers

1086 search results - page 61 / 218
» Points surrounding the origin
Sort
View
ICIP
2005
IEEE
16 years 3 months ago
Greedy non-linear approximation of the plenoptic function for interactive transmission of 3D scenes
We consider an interactive browsing environment, with greedy optimization of a current view, conditioned on the availability of previously transmitted information for other (possi...
Pietro Zanuttigh, Nicola Brusco, David Taubman, Gu...
114
Voted
VIS
2004
IEEE
143views Visualization» more  VIS 2004»
16 years 2 months ago
Rough Interface Reconstruction Using the Level Set Method
We present a new level set method for reconstructing interfaces from point aggregations. Although level-set-based methods are advantageous because they can handle complicated topo...
David Thompson, Raghu Machiraju, Yootai Kim
PCI
2009
Springer
15 years 5 months ago
Query Sensitive Storage for Wireless Sensor Networks
—Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS),...
Alexis Papadimitriou, Dimitrios Katsaros, Yannis M...
ACISP
2000
Springer
15 years 5 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
CIAC
2000
Springer
118views Algorithms» more  CIAC 2000»
15 years 5 months ago
Speeding Up Pattern Matching by Text Compression
Abstract. Byte pair encoding (BPE) is a simple universal text compression scheme. Decompression is very fast and requires small work space. Moreover, it is easy to decompress an ar...
Yusuke Shibata, Takuya Kida, Shuichi Fukamachi, Ma...