Sciweavers

5722 search results - page 46 / 1145
» Security Function Interactions
Sort
View
BILDMED
2009
173views Algorithms» more  BILDMED 2009»
13 years 9 months ago
Interactive Boundary Detection for Automatic Definition of 2D Opacity Transfer Function
In computer assisted diagnostics nowadays, high-value 3-D visualization intake a supporting role to the traditional 2-D slice wise visualization. 3-D visualization may create intui...
Martin Rauberger, Heinrich M. Overhoff
AFRIGRAPH
2004
ACM
14 years 2 months ago
Interactive modelling from sketches using spherical implicit functions
We present an interactive modelling technique, which reconstructs three-dimensional objects from user-drawn twodimensional strokes. We first extract a skeleton from the 2D contour...
Ileana Anca Alexe, Véronique Gaildrat, Lo&i...
CAI
2007
Springer
13 years 8 months ago
On High-Rate Cryptographic Compression Functions
Abstract. The security of iterated hash functions relies on the properties of underlying compression functions. We study highly efficient compression functions based on block ciphe...
Richard Ostertág, Martin Stanek
CLUSTER
1999
IEEE
13 years 8 months ago
Experimental measurements and design guidelines for real-time software encryption in multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement real time cryptographic services. In this paper we evaluate the use of software b...
Aura Ganz, Se Hyun Park, Zvi Ganz