Sciweavers

2231 search results - page 384 / 447
» Hierarchical back-face computation
Sort
View
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
15 years 10 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
BTW
2007
Springer
142views Database» more  BTW 2007»
15 years 10 months ago
Algebraic Query Optimization for Distributed Top-k Queries
: Distributed top-k query processing is increasingly becoming an essential functionality in a large number of emerging application classes. This paper addresses the efficient alge...
Thomas Neumann, Sebastian Michel
140
Voted
EVOW
2007
Springer
15 years 10 months ago
Unsupervised Evolutionary Segmentation Algorithm Based on Texture Analysis
Abstract. This work describes an evolutionary approach to texture segmentation, a long-standing and important problem in computer vision. The difficulty of the problem can be relat...
Cynthia B. Pérez, Gustavo Olague
ISVC
2007
Springer
15 years 10 months ago
Nonuniform Segment-Based Compression of Motion Capture Data
This paper presents a lossy compression method for motion capture data. Each degree of freedom of a motion clip is smoothed by an anisotropic diffusion process and then divided int...
Yi Lin, Michael D. McCool
131
Voted
ICNP
2006
IEEE
15 years 10 months ago
Scaling IP Routing with the Core Router-Integrated Overlay
— IP routing scalability is based on hierarchical routing, which requires that the IP address hierarchy be aligned with the physical topology. Both site multi-homing and switchin...
Xinyang Zhang, Paul Francis, Jia Wang, Kaoru Yoshi...