<--- Back to Details
First PageDocument Content
Geometry / Space / Mathematics / Curves / Curve / General topology / Metric geometry / Topology / Differential geometry of curves / Image segmentation / Markov chain / Z curve
Date: 2009-03-20 22:56:56
Geometry
Space
Mathematics
Curves
Curve
General topology
Metric geometry
Topology
Differential geometry of curves
Image segmentation
Markov chain
Z curve

Parsing Images into Region and Curve Processes Zhuowen Tu and Song-Chun Zhu Department of Computer and Information Science The Ohio State University fztu,

Add to Reading List

Source URL: pages.ucsd.edu

Download Document from Source Website

File Size: 1.007,00 KB

Share Document on Facebook

Similar Documents

The Next Bigly Thing : Plastic-To-Oil by Robert A. Nelson Many experts warn that we are on the down side of the

The Next Bigly Thing : Plastic-To-Oil by Robert A. Nelson Many experts warn that we are on the down side of the "Peak Oil" Bell Curve of supply:demand -- but we clever hominids shall probe ever deeper with mighty microwa

DocID: 1xVPR - View Document

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

DocID: 1xVNI - View Document

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

DocID: 1xVem - View Document

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document