Sciweavers

247 search results - page 23 / 50
» Session-Key Generation Using Human Passwords Only
Sort
View
CGF
2010
218views more  CGF 2010»
14 years 11 months ago
Mesh Snapping: Robust Interactive Mesh Cutting Using Fast Geodesic Curvature Flow
This paper considers the problem of interactively finding the cutting contour to extract components from a given mesh. Some existing methods support cuts of arbitrary shape but re...
Juyong Zhang, Chunlin Wu, Jianfei Cai, Jianmin Zhe...
PRESENCE
2006
104views more  PRESENCE 2006»
14 years 11 months ago
Physically Realistic Virtual Surgery Using the Point-Associated Finite Field (PAFF) Approach
The generation of multimodal virtual environments for surgical training is complicated by the necessity to develop heterogeneous simulation scenarios such as surgical incision, ca...
Suvranu De, Yi-Je Lim, Manivannan Muniyandi, Manda...
NDSS
2003
IEEE
15 years 5 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
ISCAS
2008
IEEE
160views Hardware» more  ISCAS 2008»
15 years 6 months ago
ATLAS: An adaptively formed hierarchical cell library based analog synthesis framework
— This paper presents ATLAS - a framework for automated analog circuit synthesis that comprises of both topology generation and subsequent circuit sizing. A hierarchically arrang...
Angan Das, Ranga Vemuri
IJHR
2008
119views more  IJHR 2008»
14 years 11 months ago
Imitation Learning of Dual-Arm Manipulation Tasks in Humanoid Robots
In this paper, we deal with imitation learning of arm movements in humanoid robots. Hidden Markov Models (HMM) are used to generalize movements demonstrated to a robot multiple tim...
Tamim Asfour, Pedram Azad, Florian Gyarfas, Rü...