Login / Signup

Securing Constrained Edges in a Triangulation.

Jan KuceraNorbert AdamkoMichal Varga
Published in: IDT (2021)
Keyphrases
  • information security
  • real world
  • directed graph
  • range data
  • data structure
  • search algorithm
  • wavelet transform
  • scale space
  • edge detector
  • edge information
  • edge enhancement
  • identity management