Sciweavers

1987 search results - page 324 / 398
» Directional filtering transform
Sort
View
139
Voted
CSFW
1999
IEEE
15 years 7 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
MM
1999
ACM
112views Multimedia» more  MM 1999»
15 years 7 months ago
Geometrically correct imagery for teleconferencing
Current camera-monitor teleconferencing applications produce unrealistic imagery and break any sense of presence for the participants. Other capture/display technologies can be us...
Ruigang Yang, Michael S. Brown, W. Brent Seales, H...
186
Voted
SIGGRAPH
1999
ACM
15 years 7 months ago
A Morphable Model for the Synthesis of 3D Faces
In this paper, a new technique for modeling textured 3D faces is introduced. 3D faces can either be generated automatically from one or more photographs, or modeled directly throu...
Volker Blanz, Thomas Vetter
124
Voted
ISCAS
1999
IEEE
95views Hardware» more  ISCAS 1999»
15 years 6 months ago
Evaluating iterative improvement heuristics for bigraph crossing minimization
The bigraph crossing problem, embedding the two node sets of a bipartite graph G = V0;V1;E along two parallel lines so that edge crossings are minimized, has application to placeme...
Matthias F. M. Stallmann, Franc Brglez, Debabrata ...
CP
1999
Springer
15 years 6 months ago
The Theory of Discrete Lagrange Multipliers for Nonlinear Discrete Optimization
In this paper we present a Lagrange-multiplier formulation of discrete constrained optimization problems, the associated discrete-space first-order necessary and sufficient condit...
Benjamin W. Wah, Zhe Wu