Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
We present an initial exploration into the usability of 3D file browsing. To explore the 3D file browsing technique design space, we analyzed the existing literature and developed...
Anamary Leal, Chadwick A. Wingrave, Joseph J. LaVi...
We consider soft constraint problems where some of the preferences may be unspecified. This models, for example, settings where agents are distributed and have privacy issues, or ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
Background: Comfrey is consumed by humans as a vegetable and a tea, and has been used as an herbal medicine for more than 2000 years. Comfrey, however, is hepatotoxic in livestock...
Nan Mei, Lei Guo, Lu Zhang 0013, Leming M. Shi, Yo...
We propose a mesh segmentation algorithm via recursive bisection where at each step, a sub-mesh embedded in 3D is first spectrally projected into the plane and then a contour is ...