Sciweavers

961 search results - page 161 / 193
» Visual Cryptography on Graphs
Sort
View
3DPVT
2006
IEEE
240views Visualization» more  3DPVT 2006»
14 years 2 months ago
Global Depth from Epipolar Volumes--A General Framework for Reconstructing Non-Lambertian Surfaces
Using Epipolar Image Analysis in the context of the correspondence finding problem in depth reconstruction has several advantages. One is the elegant incorporation of prior knowl...
Timo Stich, Art Tevs, Marcus A. Magnor
APWEB
2005
Springer
14 years 1 months ago
A Pattern Restore Method for Restoring Missing Patterns in Server Side Clickstream Data
Abstract. When analyzing patterns in server side data, it becomes quickly apparent that some of the data originating from the client is lost, mainly due to the caching of web pages...
I-Hsien Ting, Chris Kimble, Daniel Kudenko
SG
2005
Springer
14 years 1 months ago
Automatic Cross-Sectioning Based on Topological Volume Skeletonization
: Cross-sectioning is a popular method for visualizing the complicated inner structures of three-dimensional volume datasets. However, the process is usually manual, meaning that a...
Yuki Mori, Shigeo Takahashi, Takeo Igarashi, Yurik...
BVAI
2005
Springer
14 years 1 months ago
Algorithm That Mimics Human Perceptual Grouping of Dot Patterns
We propose an algorithm that groups points similarly to how human observers do. It is simple, totally unsupervised and able to find clusters of complex and not necessarily convex s...
Giuseppe Papari, Nicolai Petkov
APSEC
2000
IEEE
14 years 15 days ago
Survivability Analysis of Networked Systems
Survivability is the ability of a system to continue operating despite the presence of abnormal events such as failures and intrusions. Ensuring system survivability has increased...
Jeannette M. Wing