: Light scattering studies are done by researchers of various scientific areas. As the calculation of the scattering behavior by small particles is rather complex, corresponding pr...
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
This paper proposes an algorithm to simultaneously estimate both the 3D shape and parameters of a surface reflectance model from multiple views of an object made of a single mater...
We present an algorithm that recognizes objects of a given category using a small number of hand segmented images as references. Our method first over segments an input image into...
Recommendation systems are widely used on the Internet to assist customers in finding the products or services that best fit with their individual preferences. While current imple...
Jochen Malinowski, Tobias Keim, Oliver Wendt, Tim ...