This paper presents a novel algorithm for generating a watertight level-set from an octree. We show that the levelset can be efficiently extracted regardless of the topology of th...
Michael M. Kazhdan, Allison Klein, Ketan Dalal, Hu...
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
The Concept of Populated Information Terrains (PITS) aims to extend database technology with key ideas from the new fields of Virtual Reality (VR) and Computer Supported Cooperativ...
: Internet governance is a contentious topic referring to the global control and management of key internet resources such as IP addresses. Research suggests that the existence of ...
When constructing 3D geometry for use in cel animation, the reference drawings of the object or character often contain various view-specific distortions, which cannot be captured...