Sciweavers

1361 search results - page 171 / 273
» Skeletonization of Digital Objects
Sort
View
IJNSEC
2008
108views more  IJNSEC 2008»
15 years 4 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
100
Voted
CG
2007
Springer
15 years 4 months ago
Density estimation for dynamic volumes
We propose a new approach to capture the volumetric density of dynamic scattering media instantaneously with a single image. The volume is probed with a set of laser lines and the...
Christian Fuchs, Tongbo Chen, Michael Goesele, Hol...
COMPUTING
2007
424views more  COMPUTING 2007»
15 years 4 months ago
Anamorphic 3D geometry
An anamorphic image appears distorted from all but a few viewpoints. They have been studied by artists and architects since the early fifteenth century. Computer graphics opens t...
Dianne Hansford, D. Collins
IJNSEC
2007
127views more  IJNSEC 2007»
15 years 4 months ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan
CCR
2005
126views more  CCR 2005»
15 years 3 months ago
Large scale content distribution protocols
This paper introduces large scale content distribution protocols, which are capable of scaling to massive numbers of users and providing low delay end-to-end delivery. Delivery of...
Christoph Neumann, Vincent Roca, Rod Walsh