Conserve 发表于 2025-3-30 10:47:40

http://reply.papertrans.cn/87/8603/860217/860217_51.png

blister 发表于 2025-3-30 14:52:19

http://reply.papertrans.cn/87/8603/860217/860217_52.png

发起 发表于 2025-3-30 17:54:01

http://reply.papertrans.cn/87/8603/860217/860217_53.png

洞穴 发表于 2025-3-30 23:15:13

Remote Entrusting by Run-Time Software Authenticatione this problem. Specifically, we address the problem of ensuring that a given piece of code executes on an remote untrusted machine and that its functionalities have not been tampered with both before execution and during run-time.

chalice 发表于 2025-3-31 04:51:02

http://reply.papertrans.cn/87/8603/860217/860217_55.png

lanugo 发表于 2025-3-31 05:48:46

http://reply.papertrans.cn/87/8603/860217/860217_56.png

FEAS 发表于 2025-3-31 11:17:59

http://reply.papertrans.cn/87/8603/860217/860217_57.png

SOBER 发表于 2025-3-31 14:18:31

http://reply.papertrans.cn/87/8603/860217/860217_58.png

Gorilla 发表于 2025-3-31 21:08:31

An Algorithm for Computation of the Scene Geometry by the Log-Polar Area Matching Around Salient Poiof scale and rotation of the matched areas. This feature is employed in the matching algorithm to eliminate outliers. The proposed method can be used in variety of computer vision tasks, such as stereovision, recovering shape and motion from video, or camera calibration and autocalibration.

值得 发表于 2025-3-31 21:49:27

http://reply.papertrans.cn/87/8603/860217/860217_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: SOFSEM 2008: Theory and Practice of Computer Science; 34th Conference on C Viliam Geffert,Juhani Karhumäki,Mária Bieliková Conference proce