Sciweavers

3116 search results - page 255 / 624
» Recovering
Sort
View
CAD
2007
Springer
15 years 25 days ago
Detection of closed sharp edges in point clouds using normal estimation and graph theory
The reconstruction of a surface model from a point cloud is an important task in the reverse engineering of industrial parts. We aim at constructing a curve network on the point c...
Kris Demarsin, Denis Vanderstraeten, Tim Volodine,...
109
Voted
IJNSEC
2008
85views more  IJNSEC 2008»
15 years 25 days ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He
IJNSEC
2006
107views more  IJNSEC 2006»
15 years 24 days ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
IJNSEC
2006
115views more  IJNSEC 2006»
15 years 24 days ago
Reversible Watermarking: Current Status and Key Issues
Over the past few years a number of research papers about reversible watermarks has been produced. Reversible watermarking is a novel category of watermarking schemes. It not only...
Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, ...
IJON
2006
109views more  IJON 2006»
15 years 24 days ago
Associative memory of connectivity patterns
The goal of the visual correspondence problem is to establish a connectivity pattern (a mapping) between two images such that features projected from the same scene point are conn...
Junmei Zhu, Christoph von der Malsburg