Sciweavers

1056 search results - page 171 / 212
» Three approaches to object evolution
Sort
View
EUROCRYPT
2010
Springer
14 years 15 days ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
SMA
2008
ACM
182views Solid Modeling» more  SMA 2008»
13 years 7 months ago
Voronoi diagram computations for planar NURBS curves
We present robust and efficient algorithms for computing Voronoi diagrams of planar freeform curves. Boundaries of the Voronoi diagram consist of portions of the bisector curves b...
Joon-Kyung Seong, Elaine Cohen, Gershon Elber
TOG
2012
208views Communications» more  TOG 2012»
11 years 10 months ago
Video-based 3D motion capture through biped control
Marker-less motion capture is a challenging problem, particularly when only monocular video is available. We estimate human motion from monocular video by recovering three-dimensi...
Marek Vondrak, Leonid Sigal, Jessica K. Hodgins, O...
ICCV
1999
IEEE
14 years 9 months ago
Fluid Motion Recovery by Coupling Dense and Parametric Vector Fields
In this paper we address the problem of estimating and analyzing the motion in image sequences that involve fluid phenomena. In this context standard motion estimation techniques ...
Étienne Mémin, Patrick Pérez
ICRA
2009
IEEE
165views Robotics» more  ICRA 2009»
14 years 2 months ago
Collision avoidance in dynamic environments: An ICS-based solution and its comparative evaluation
Abstract— This paper presents ICS-AVOID, a collision avoidance scheme based upon the concept of Inevitable Collision State (ICS), ie a state for which, no matter what the future ...
Luis Martinez-Gomez, Thierry Fraichard