Sciweavers

2938 search results - page 44 / 588
» On obfuscating point functions
Sort
View
3DPVT
2006
IEEE
189views Visualization» more  3DPVT 2006»
14 years 1 months ago
Fast Safe Spline Surrogates for Large Point Clouds
To support real-time computation with large, possibly evolving point clouds and range data, we fit a trimmed uniform tensor-product spline function from one direction. The graph ...
Ashish Myles, Jörg Peters
ICRA
2005
IEEE
135views Robotics» more  ICRA 2005»
14 years 1 months ago
Efficient Closed Contour Extraction from Range Image's Edge Points
Abstract - This paper presents an improvement over a previous contour closure algorithm. Assuming that edge points are given as input, the proposed approach consists of two steps. ...
Angel Domingo Sappa
PVLDB
2010
101views more  PVLDB 2010»
13 years 2 months ago
InZeit: Efficiently Identifying Insightful Time Points
Web archives are useful resources to find out about the temporal evolution of persons, organizations, products, or other topics. However, even when advanced text search functional...
Vinay Setty, Srikanta J. Bedathur, Klaus Berberich...
FCCM
2009
IEEE
192views VLSI» more  FCCM 2009»
14 years 2 months ago
FPGA Floating Point Datapath Compiler
This paper will describe the architecture of a compiler which will convert an untimed C description of a set of floating point expressions into a synthesizable datapath optimized ...
Martin Langhammer, Tom VanCourt
CORR
2007
Springer
74views Education» more  CORR 2007»
13 years 7 months ago
Secure Two-party Protocols for Point Inclusion Problem
It is well known that, in theory, the general secure multiparty computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the re...
Tony Thomas