Sciweavers

953 search results - page 73 / 191
» A note on the paper
Sort
View
CGF
2002
155views more  CGF 2002»
13 years 7 months ago
Improved Scene Reconstruction from Range Images
The modeling of real scenes is a complex and challenging task for which the use of laser rangefinders is one of the most promising approaches. Unfortunately, in many situations, i...
Jianning Wang, Manuel M. Oliveira
IPL
2000
101views more  IPL 2000»
13 years 7 months ago
Visual cryptography for grey level images
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of parti...
Carlo Blundo, Alfredo De Santis, Moni Naor
MOC
2000
80views more  MOC 2000»
13 years 7 months ago
On a unit group generated by special values of Siegel modular functions
Abstract. There has been important progress in constructing units and Sunits associated to curves of genus 2 or 3. These approaches are based mainly on the consideration of propert...
Takashi Fukuda, Keiichi Komatsu
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
13 years 7 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
TISSEC
2002
82views more  TISSEC 2002»
13 years 7 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis