نتایج جستجو برای: tracing algorithm

تعداد نتایج: 778964  

Journal: :Medical image computing and computer-assisted intervention : MICCAI ... International Conference on Medical Image Computing and Computer-Assisted Intervention 2012
Vignesh Jagadeesh Min-Chi Shih B. S. Manjunath Kenneth Rose

A novel framework for robust 3D tracing in electron micrographs is presented. The proposed framework is built using ideas from hypergraph diffusion, and achieves two main objectives. Firstly, the approach scales to trace hundreds of targets without noticeable increase in runtime complexity. Secondly, the framework yields flexibility to fuse top down (global cues as hyperedges) and bottom up (lo...

Journal: :IACR Cryptology ePrint Archive 2001
Alice Silverberg Jessica Staddon Judy L. Walker

We apply powerful, recently discovered techniques for the list decoding of error-correcting codes to the problem of efficiently tracing traitors. Much work has focused on methods for constructing such traceability schemes, but the complexity of the traitor tracing algorithms has received little attention. A widely used traitor tracing algorithm, the TA algorithm, has a runtime of O(N) in genera...

Journal: :Journal of Environmental Engineering (Transactions of AIJ) 2016

2006
R. Keith Morley Solomon Boulos Jared M. Johnson David Edwards Peter Shirley Michael Ashikhmin Simon Premoze

The most straightforward image synthesis algorithm is to follow photon-like particles from luminaires through the environment. These particles scatter or are absorbed when they interact with a surface or a volume. They contribute to the image if and when they strike a sensor. Such an algorithm implicitly solves the light transport equation. Alternatively, adjoint photons can be traced from the ...

1999
Brett Keating Nelson L. Max

This paper presents an efficient algorithm for filtering multi-layer depth images (MDIs) in order to produce approximate penumbras. The filtering is performed on a MDI that represents the view from the light source. The algorithm is based upon both ray tracing and the z-buffer shadow algorithm, and is closely related to convolution methods. The method’s effectiveness is demonstrated on especial...

Journal: :EURASIP Journal on Wireless Communications and Networking 2006

2003
Simon McNicol Serdar Boztas

We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is O(√T ) where T is the mean time taken by the brute force algorithm) and can catch traitors, i.e., dishonest users who collude by giving subsets of their key(s) to others. The system model we use can be applied to vari...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید