Sciweavers

5544 search results - page 974 / 1109
» Three Inadequate Models
Sort
View
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 4 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
ASIAN
2005
Springer
178views Algorithms» more  ASIAN 2005»
15 years 3 months ago
An Approach for Service Discovery Based on Semantic Peer-to-Peer
The service discovery is a key step during Peer-to-Peer (P2P) converging with Web Service. In this paper, a semantic-P2P based approach is presented for web service discovery. To e...
Hao Wu, Hai Jin, Yunfa Li, Hanhan Chen
CVPR
2009
IEEE
16 years 5 months ago
Dense 3D Motion Capture for Human Faces
This paper proposes a novel approach to motion capture from multiple, synchronized video streams, specifically aimed at recording dense and accurate models of the structure and ...
Yasutaka Furukawa (University of Washington), Jean...
CVPR
1999
IEEE
16 years 4 days ago
Panoramic EPI Generation and Analysis of Video from a Moving Platform with Vibration
This paper presents a novel approach for generating and analyzing epipolar plane images (EPIs) from video sequences taken from a moving platform subject to vibration so that the 3...
Zhigang Zhu, Guangyou Xu, Xueyin Lin
CVPR
2004
IEEE
16 years 4 days ago
Bayesian Assembly of 3D Axially Symmetric Shapes from Fragments
We present a complete system for the purpose of automatically assembling 3D pots given 3D measurements of their fragments commonly called sherds. A Bayesian approach is formulated...
Andrew R. Willis, David B. Cooper