欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
Dynamic Texture Analysis using Eigenvectors of Gradient Skewness Tensors
所属机构名称:北京大学
会议名称:Proceedings of the 2nd International Conference on Computer Science and Service System
时间:2012.9.9
成果类型:会议
相关项目:信息处理中的关键数学问题
作者:
Fan Zhang|Bingyin Zhou|Lizhong Peng|
同会议论文项目
信息处理中的关键数学问题
期刊论文 199
会议论文 50
著作 3
同项目会议论文
An alternative derivation for Bronnikov's reconstruction formula in x-ray phase contrast tomogra
常平均曲率细分曲面的构造
Strong Unforgeability in Ring Signature Schemes
A Class of Elliptic Curves in Edwards Form
Collaborative Integrity Verification in Hybrid Clouds
A New Family of Quadriphase Sequences with Low Correlation
Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One
Solving the single rate 2-pair network coding problem with the A-set equation
Quality multi-domain meshing for volumetric data
An improved color image demosaicking algorithm
保特征散乱数据的曲面重构----变分水平集方法
Linear recurring sequences and subfield subcodes
Construction of minimal Catmull-Clark's subdivision surfaces with given boundaries
Construction of Subdivision Surfaces by Fourth-Order Geometric Flows with G(1) Boundary Conditions
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem
Secure Data Retrieval of Outsourced Data with Complex Query Support
Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices
A novel geometric flow-driven approach for quality improvement of segmented tetrahedral meshes
A new model of binary elliptic curves
An improved algorithm for computing 2P Q on elliptic curves
Towards Temporal Access Control in Cloud Computing
Geometric quantization on noncompact manifolds
Flexible alignment of images using B-spline reparameterization and L 2-gradient flows
Electric-potential reconstructions of single particles using L 2-gradient flows
A new reconstruction algorithm in tomography with geometric feature-preserving regularization
Differential Fault Attack on the PRINCE Block Cipher
Efficient self-pairing on ordinary elliptic curves
Super-optimal pairings
Incorrigible Set Distributions and Unsuccessful Decoding Probability of Linear Codes
Enabling Secure Location-based Services in Mobile Cloud Computing
How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud
Cryptographic Spatio-Temporal Predicates for Location-based Services
Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key Cryptosystem
Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
High order total variation method for interior tomography
A Novel Identity Based Undeniable Signature Scheme
A robust 2-refinement algorithm in octree and rhombic dodecahedral tree based all-hexahedral mesh ge
On the isomorphism classes of elliptic curves with 2-torsion points
A generalization of Verheul's theorem for some ordinary curves
Universal network error correction MDS codes
Efficient identity-based encryption without pairings and key escrow for mobile devices
On the number of isomorphism classes of elliptic curves with 2-torsion points over finite fields
End-to-End Aggregate Authentication of Time-Series Data
A kind of cyclotomic numbers and Sidelnikov sequences
Twisted Jacobi intersections curves
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
The encoding complexity of network coding with two simple multicast sessions
Cube Cryptanalysis of Hitag2 Stream Cipher
Solving the two simple multicast network coding problem in time O(E)