Sciweavers

2333 search results - page 17 / 467
» Recursive Computational Depth
Sort
View
STACS
2007
Springer
14 years 2 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung
ICIP
2007
IEEE
14 years 9 months ago
A New Descriptor for 2D Depth Image Indexing and 3D Model Retrieval
We present here a new descriptor for depth images adapted to 2D/3D model matching and retrieving. We propose a representation of a 3D model by 20 depth images rendered from the ve...
Mohamed Chaouch, Anne Verroust-Blondet
COMGEO
2008
ACM
13 years 8 months ago
An optimal randomized algorithm for d-variate zonoid depth
A randomized linear expected-time algorithm for computing the zonoid depth (Dyckerhoff et al 1996, Mosler 2002) of a point with respect to a fixed dimensional point set is presente...
Pat Morin
MVA
2007
158views Computer Vision» more  MVA 2007»
13 years 7 months ago
Hybrid object labelling in digital images
The application of a technique for labelling connected components based on the classical recursive technique is studied. The recursive approach permits labelling, counting, and cha...
Julio Martín-Herrero