An improved finegrained ciphertext policy based temporary keyword search on encrypted data for secure cloud storage. [PDF]
Dabra M, Sharma S, Kumar S, Min H.
europepmc +1 more source
2D Piecewise Linear Scalar Fields with Invertible Integral Lines
Abstract Integral lines of the gradient flow are standard features in continuously differentiable scalar fields that enjoy some useful properties: They cover the domain densely, do not split, merge, or intersect, and are therefore invertible. For widely used discretizations of scalar fields, the corresponding polygonal approximations of integral lines ...
T.L. Erxleben +3 more
wiley +1 more source
Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes. [PDF]
Yi W +4 more
europepmc +1 more source
Fast Injective Mesh Parameterization via Beltrami Coefficient Prolongation
Abstract We present a highly efficient and robust method for free boundary injective parameterization of disk‐like triangle meshes with low isometric distortion. Harmonic function–based approaches, grounded in a strong mathematical framework, are widely employed.
G. Fargion, O. Weber
wiley +1 more source
Self‐supervised Learning of Fine‐to‐Coarse Cuboid Shape Abstraction
Abstract The abstraction of 3D objects with simple geometric primitives like cuboids allows us to infer structural information from complex geometry. It is important for 3D shape understanding, structural analysis and geometric modeling. We introduce a novel fine‐to‐coarse self‐supervised learning approach to abstract collections of 3D shapes.
Gregor Kobsik +6 more
wiley +1 more source
Blockchain Factors in the Design of Smart-Media for E-Healthcare Management. [PDF]
Shah D +6 more
europepmc +1 more source
Non‐Rigid 3D Shape Correspondences: From Foundations to Open Challenges and Opportunities
Abstract Estimating correspondences between deformed shape instances is a long‐standing problem in computer graphics; numerous applications, from texture transfer to statistical modelling, rely on recovering an accurate correspondence map. Many methods have thus been proposed to tackle this challenging problem from varying perspectives, depending on ...
A. Zhuravlev +14 more
wiley +1 more source
IoT data security in outsourced databases: A survey of verifiable database. [PDF]
Chen A, Yu S, Yang X, Huang D, Ren Y.
europepmc +1 more source
Hierarchical Optimization of the As‐Rigid‐As‐Possible Energy
Abstract The As‐Rigid‐As‐Possible (ARAP) energy [SA07] has become a versatile ingredient in various geometry processing and machine learning methods. The classic method for its minimization is a block coordinate descent, alternating between local rotation estimation and a global linear solve, which converges slowly for large problem instances.
Hendrik Meyer, Bernd Bickel, Marc Alexa
wiley +1 more source
Establishing Shape Correspondences: A Survey
Abstract Shape correspondence between surfaces in 3D is a central problem in geometry processing, concerned with establishing meaningful relations between surfaces. While all correspondence problems share this goal, specific formulations can differ significantly: Downstream applications require certain properties that correspondences must satisfy ...
A. Heuschling, H. Meinhold, L. Kobbelt
wiley +1 more source

