We present a technique for rendering animated 3D models in a Su-Muk painting style with user’s guide. First, a user can sketch directly over 3D models by varying ink and water va...
Jung Lee, Joon-Yong Ji, Soo-Kyun Kim, Chang-Hun Ki...
Mobile Phone has been widely used in the world and adopted in different application areas involved with SMS has been evolved for downloading logo, ring-tones, advertisement, secur...
Genetic Studies examine relationships between genetic variation and disease development. Pharmacogenetics studies the responses to drugs against genetic variation. These two lines ...
In this paper, we propose a new clustering procedure for high dimensional microarray data. Major difficulty in cluster analysis of microarray data is that the number of samples to ...
Abstract. Skeleton driven animation is a popular method for the animation of deformable human and creature characters. The main advantage is its computational performance. However ...
Abstract. We apply internal perturbation [3] to the matrix-type cryptosystems [Cn] and HM constructed in [9]. Using small instances of these variants, we investigate the existence ...
Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng ...
Abstract. The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a strea...
Abstract. A company needs to implement several make-to-stock policies apart from a regular make-to-order production, so that the capacity of expensive resources can be fully utiliz...
S. Michael Wang, Kung-Jeng Wang, Hui-Ming Wee, J. ...
In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8–11], and claimed his schemes are secure. However, this paper dem...