Sciweavers

961 search results - page 116 / 193
» Visual Cryptography on Graphs
Sort
View
APVIS
2006
13 years 9 months ago
Visual analysis of network centralities
Centrality analysis determines the importance of vertices in a network based on their connectivity within the network structure. It is a widely used technique to analyse network-s...
Tim Dwyer, Seok-Hee Hong, Dirk Koschützki, Fa...
TROB
2008
168views more  TROB 2008»
13 years 8 months ago
A Minimalistic Approach to Appearance-Based Visual SLAM
This paper presents a vision-based approach to SLAM in indoor / outdoor environments with minimalistic sensing and computational requirements. The approach is based on a graph repr...
Henrik Andreasson, Tom Duckett, Achim J. Lilientha...
RC
2000
99views more  RC 2000»
13 years 8 months ago
Interval Constraint Plotting for Interactive Visual Exploration of Implicitly Defined Relations
Conventional plotting programs adopt techniques such as adaptive sampling to approximate, but not to guarantee, correctness and completeness in graphing functions. Moreover, implic...
Timothy J. Hickey, Zhe Qju, Maarten H. van Emden
VIS
2007
IEEE
117views Visualization» more  VIS 2007»
14 years 9 months ago
IStar: A Raster Representation for Scalable Image and Volume Data
Topology has been an important tool for analyzing scalar data and flow fields in visualization. In this work, we analyze the topology of multivariate image and volume data sets wit...
Joe Kniss, Warren Hunt, Kristin Potter, Pradeep...
IV
1999
IEEE
198views Visualization» more  IV 1999»
14 years 15 days ago
A Prototype Hotel Browsing System Using Java3D
Java3D is an application-centred approach to building 3D worlds. We use Java3D and VRML to design a prototype WWW-based 3D Hotel Browsing system. A Java3D scene graph viewer was i...
D. Ball, Majid Mirmehdi