Sciweavers

2223 search results - page 390 / 445
» Hierarchical Morphable Models
Sort
View
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
14 years 2 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
COMPGEOM
2004
ACM
14 years 2 months ago
Approximate convex decomposition of polygons
We propose a strategy to decompose a polygon, containing zero or more holes, into “approximately convex” pieces. For many applications, the approximately convex components of ...
Jyh-Ming Lien, Nancy M. Amato
MMDB
2004
ACM
136views Multimedia» more  MMDB 2004»
14 years 2 months ago
A motion based scene tree for browsing and retrieval of compressed videos
This paper describes a fully automatic content-based approach for browsing and retrieval of MPEG-2 compressed video. The first step of the approach is the detection of shot bound...
Haoran Yi, Deepu Rajan, Liang-Tien Chia
SACMAT
2004
ACM
14 years 2 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
AMDO
2004
Springer
14 years 2 months ago
Variant Design in Immersive Virtual Reality: A Markup Language for Scalable CSG Parts
In many product areas, a growing trend can be observed towards variant design, i.e. the development of customized designs based on variations of mature product models. We have deve...
Peter Biermann, Bernhard Jung