Sciweavers

2827 search results - page 361 / 566
» Robustness of PSPACE-complete sets
Sort
View
152
Voted
VLSM
2005
Springer
15 years 9 months ago
A Surface Reconstruction Method for Highly Noisy Point Clouds
In this paper we propose a surface reconstruction method for highly noisy and non-uniform data based on minimal surface model and tensor voting method. To deal with ill-posedness, ...
DanFeng Lu, HongKai Zhao, Ming Jiang 0001, ShuLin ...
143
Voted
BVAI
2005
Springer
15 years 9 months ago
Incomplete Contour Representations and Shape Descriptors: ICR Test Studies
Inspired by psychophysical studies of the human cognitive abilities we propose a novel aspect and a method for performance evaluation of contour based shape recognition algorithms ...
Anarta Ghosh, Nicolai Petkov
AMDO
2004
Springer
15 years 9 months ago
Real Time Segmentation and Tracking of Face and Hands in VR Applications
We describe a robust real-time 3D tracking system of the extreme limbs of the upper human body, i.e., the hands and the face. The goal of the system is that it can be used as a per...
Jose Maria Buades Rubio, Francisco J. Perales L&oa...
ICNP
2003
IEEE
15 years 9 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
CCS
2003
ACM
15 years 9 months ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper