Skip to main content

previous disabled Page of 11
and
  1. No Access

    Living Reference Work Entry In depth

    Anamorphic Cryptography

    Yi Wang, Rongmao Chen, **nyi Huang in Encyclopedia of Cryptography, Security and…

  2. No Access

    Reference Work Entry In depth

    UV Map Generation on Triangular Mesh

    Min Wang, Lizhuang Ma in Encyclopedia of Computer Graphics and Games (2024)

  3. No Access

    Reference Work Entry In depth

    Poisson-Disk Sampling: Theory and Applications

    Tong Wang in Encyclopedia of Computer Graphics and Games (2024)

  4. No Access

    Living Reference Work Entry In depth

    Kleptography

    Rongmao Chen, Yi Wang, **nyi Huang in Encyclopedia of Cryptography, Security and…

  5. No Access

    Reference Work Entry In depth

    High-Performance Many-Light Rendering

    Tong Wang in Encyclopedia of Computer Graphics and Games (2024)

  6. No Access

    Living Reference Work Entry In depth

    Network Hardening

    Abstract

    Lingyu Wang in Encyclopedia of Cryptography, Security and Privacy

  7. No Access

    Living Reference Work Entry In depth

    Oblivious Data Structures

    Abstract

    **ao Wang in Encyclopedia of Cryptography, Security and Privacy

  8. No Access

    Living Reference Work Entry In depth

    Synthetic Data

    **nyue Wang, Hafiz Asif, Jaideep Vaidya in Encyclopedia of Cryptography, Security and…

  9. No Access

    Living Reference Work Entry In depth

    Range Queries over Encrypted Data

    abstract

    Sherman S. M. Chow, Jiafan Wang in Encyclopedia of Cryptography, Security and Privacy

  10. No Access

    Living Reference Work Entry In depth

    Privacy of Trajectory Data

    Nana Wang, Mohan Kankanhalli in Encyclopedia of Cryptography, Security and Privacy

  11. No Access

    Living Reference Work Entry In depth

    Poisson-Disk Sampling: Theory and Applications

    Tong Wang in Encyclopedia of Computer Graphics and Games

  12. No Access

    Reference Work Entry In depth

    High-Resolution Network

    **gdong Wang in Computer Vision (2021)

  13. No Access

    Living Reference Work Entry In depth

    Machine Learning in Secured Computing

    **angyu Wei, Xu Han, Wei Wang in Encyclopedia of Cryptography, Security and Privacy

  14. No Access

    Living Reference Work Entry In depth

    High-Performance Many-Light Rendering

    Tong Wang in Encyclopedia of Computer Graphics and Games

  15. No Access

    Living Reference Work Entry In depth

    High-Resolution Network

    **gdong Wang in Computer Vision

  16. No Access

    Living Reference Work Entry In depth

    Face Recognition

    Yu Qiao, **aogang Wang in Computer Vision

  17. No Access

    Reference Work Entry In depth

    Journeys in the Age of Smart Cities: Some Fresh Perspectives

    Modern cities are intrinsically multidisciplinary and multicultural places. Inspired by that view, this chapter has invited a cross-disciplinary international team of domain experts to present their differing ...

    V. Callaghan, J. Chin, F. Doctor, T. Kymäläinen, A. Peña-Rios in Handbook of Smart Cities (2021)

  18. No Access

    Living Reference Work Entry In depth

    Journeys in the Age of Smart Cities: Some Fresh Perspectives

    Modern cities are intrinsically multidisciplinary and multicultural places. Inspired by that view, this chapter has invited a cross-disciplinary international team of domain experts to present their differing ...

    V. Callaghan, J. Chin, F. Doctor, T. Kymäläinen, A. Peña-Rios in Handbook of Smart Cities

  19. No Access

    Reference Work Entry In depth

    Face Recognition

    Yu Qiao, **aogang Wang in Computer Vision (2021)

  20. No Access

    Living Reference Work Entry In depth

    Social Media in Shadow Education in China, An Introduction

    Yulong Li, Hao Wang, Shaojian Cai in Encyclopedia of Education and Information …

previous disabled Page of 11