Login / Signup
Securing Constrained Edges in a Triangulation.
Jan Kucera
Norbert Adamko
Michal Varga
Published in:
IDT (2021)
Keyphrases
</>
information security
real world
directed graph
range data
data structure
search algorithm
wavelet transform
scale space
edge detector
edge information
edge enhancement
identity management