In computer assisted diagnostics nowadays, high-value 3-D visualization intake a supporting role to the traditional 2-D slice wise visualization. 3-D visualization may create intui...
We present an interactive modelling technique, which reconstructs three-dimensional objects from user-drawn twodimensional strokes. We first extract a skeleton from the 2D contour...
Abstract. The security of iterated hash functions relies on the properties of underlying compression functions. We study highly efficient compression functions based on block ciphe...
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement real time cryptographic services. In this paper we evaluate the use of software b...