Results 131 to 140 of about 142,210 (279)

Efficient and Low-Cost RFID Authentication Schemes [PDF]

open access: yes, 2011
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme.
Miyaji, Atsuko   +2 more
core   +1 more source

2D Neural Fields with Learned Discontinuities

open access: yesComputer Graphics Forum, EarlyView.
Abstract Effective representation of 2D images is fundamental in digital image processing, where traditional methods like raster and vector graphics struggle with sharpness and textural complexity, respectively. Current neural fields offer high fidelity and resolution independence but require predefined meshes with known discontinuities, restricting ...
Chenxi Liu   +4 more
wiley   +1 more source

Adaptive Multi‐view Radiance Caching for Heterogeneous Participating Media

open access: yesComputer Graphics Forum, EarlyView.
Abstract Achieving lifelike atmospheric effects, such as fog, is essential in creating immersive environments and poses a formidable challenge in real‐time rendering. Highly realistic rendering of complex lighting interacting with dynamic fog can be very resource‐intensive, due to light bouncing through a complex participating media multiple times.
P. Stadlbauer   +6 more
wiley   +1 more source

Real‐Time Rendering Framework for Holography

open access: yesComputer Graphics Forum, EarlyView.
Abstract With the advent of holographic near‐eye displays, the need for rendering algorithms that output holograms instead of color images emerged. These holograms usually encode phase maps that alter the phase of coherent light sources such that images result from diffraction effects.
Sascha Fricke   +3 more
wiley   +1 more source

3DGS.zip: A survey on 3D Gaussian Splatting Compression Methods

open access: yesComputer Graphics Forum, EarlyView.
Abstract 3D Gaussian Splatting (3DGS) has emerged as a cutting‐edge technique for real‐time radiance field rendering, offering state‐of‐the‐art performance in terms of both quality and speed. 3DGS models a scene as a collection of three‐dimensional Gaussians, with additional attributes optimized to conform to the scene's geometric and visual properties.
M. T. Bagdasarian   +6 more
wiley   +1 more source

A Chaos-Based Image Encryption Technique Utilizing Hilbert Curves and H-Fractals

open access: yesIEEE Access, 2019
Image encryption is the most direct and effective technical means for protecting the security of image information. Based on the space filling property of the Hilbert curve and the infinite property of the H-geometric fractal, a new image encryption ...
Xuncai Zhang   +3 more
doaj   +1 more source

Augury and Forerunner: Real‐Time Feedback Via Predictive Numerical Optimization and Input Prediction

open access: yesComputer Graphics Forum, EarlyView.
Transient information generated by solver steps can inform future objective function minimization. In Augury, we explore the impact of predictive numerical optimization by using solver history to predict future minimization solutions, reducing computational resources needed to arrive at convergent states for a broad class of gradient‐based optimization
J. Graus, Y. Gingold
wiley   +1 more source

Random Access Segmentation Volume Compression for Interactive Volume Rendering

open access: yesComputer Graphics Forum, EarlyView.
Abstract Segmentation volumes are voxel data sets often used in machine learning, connectomics, and natural sciences. Their large sizes make compression indispensable for storage and processing, including GPU video memory constrained real‐time visualization.
M. Piochowiak   +2 more
wiley   +1 more source

Sca2Gri: Scalable Gridified Scatterplots

open access: yesComputer Graphics Forum, EarlyView.
Abstract Scatterplots are widely used in exploratory data analysis. Representing data points as glyphs is often crucial for in‐depth investigation, but this can lead to significant overlap and visual clutter. Recent post‐processing techniques address this issue, but their computational and/or visual scalability is generally limited to thousands of ...
S. Frey
wiley   +1 more source

Home - About - Disclaimer - Privacy