Sciweavers

6434 search results - page 252 / 1287
» Model Transformations with Reference Models
Sort
View
146
Voted
ICIP
2005
IEEE
16 years 4 months ago
Expression-invariant face recognition via spherical embedding
Recently, it was proven empirically that facial expressions can be modelled as isometries, that is, geodesic distances on the facial surface were shown to be significantly less se...
Alexander M. Bronstein, Michael M. Bronstein, Ron ...
124
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 8 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
138
Voted
IWDW
2005
Springer
15 years 8 months ago
Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis
In this paper, we propose a robust watermarking method for 3-D triangle surface meshes. Most previous methods based on the wavelet analysis can process only semi-regular meshes. Ou...
Min-Su Kim, Sébastien Valette, Ho-Youl Jung...
111
Voted
HICSS
2003
IEEE
168views Biometrics» more  HICSS 2003»
15 years 7 months ago
'Pay-per-use' Concept in Healthcare: A Grounded Theory Perspective
Healthcare organizations worldwide are faced with the growing challenge of introducing structural and technological reforms and cost-effective IT solutions that will transform the...
Abdullah A. Akbar
94
Voted
ICPR
2000
IEEE
15 years 7 months ago
Incremental Multiview Integration of Range Images
This paper presents a new method for the incremental integration of overlapped range images. It is assumed thatframe transformations between all pairs of views can be reliably com...
Angel Domingo Sappa, Miguel Angel García