Sciweavers

360 search results - page 60 / 72
» ccs 2008
Sort
View
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 3 days ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
ECAI
2008
Springer
14 years 12 months ago
The Impact of Constraint Programming
Constraint satisfaction problems (CSPs) are ubiquitous in many real-world contexts. However, modeling a problem as a CSP can be very challenging, usually requiring considerable ex...
Pascal Van Hentenryck
CG
2008
Springer
14 years 10 months ago
Parallel reflective symmetry transformation for volume data
Many volume data possess symmetric features that can be clearly observed, for example, those existing in diffusion tensor image data sets. The exploitations of symmetries for volu...
Yuan Hong, Han-Wei Shen
CGF
2007
102views more  CGF 2007»
14 years 10 months ago
Image Dequantization: Restoration of Quantized Colors
Color quantization replaces the color of each pixel with the closest representative color, and thus it makes the resulting image partitioned into uniformly-colored regions. As a c...
Tae-hoon Kim, Jongwoo Ahn, Min Gyu Choi
CGF
2010
95views more  CGF 2010»
14 years 9 months ago
Polygonal Surface Advection applied to Strange Attractors
Strange attractors of 3D vector field flows sometimes have a fractal geometric structure in one dimension, and smooth surface behavior in the other two. General flow visualization...
S. Yan, N. Max, K.-L. Ma