Sciweavers

151 search results - page 18 / 31
» Optimal (2, n) visual cryptographic schemes
Sort
View
ISCAS
2005
IEEE
106views Hardware» more  ISCAS 2005»
14 years 29 days ago
A generic multilevel multiplying D/A converter for pipelined ADCs
—State-of-art implementations of pipelined ADCs can only realize a multiplying DAC (MDAC) with (2n –1) levels. However, the number of levels needed to optimize the performance ...
Vivek Sharma, Un-Ku Moon, Gabor C. Temes
FOCS
2007
IEEE
14 years 1 months ago
Non-Linear Index Coding Outperforming the Linear Optimum
The following source coding problem was introduced by Birk and Kol: a sender holds a word x ∈ {0, 1}n , and wishes to broadcast a codeword to n receivers, R1, . . . , Rn. The re...
Eyal Lubetzky, Uri Stav
PODC
2006
ACM
14 years 1 months ago
Optimal-stretch name-independent compact routing in doubling metrics
We consider the problem of name-independent routing in doubling metrics. A doubling metric is a metric space whose doubling dimension is a constant, where the doubling dimension o...
Goran Konjevod, Andréa W. Richa, Donglin Xi...
TVCG
2008
178views more  TVCG 2008»
13 years 7 months ago
Animation of Orthogonal Texture Patterns for Vector Field Visualization
Abstract-- This paper introduces orthogonal vector field visualization on 2D manifolds: a representation by lines that are perpendicular to the input vector field. Line patterns ar...
Sven Bachthaler, Daniel Weiskopf
IFIP
2003
Springer
14 years 18 days ago
Collaborative and Distributed Computation in Mesh-Like Wireless Sensor Arrays
Sensor networks are being used for implementation of a large number of applications involving distributed and collaborative computation. Extensive research has focused upon design ...
Mitali Singh, Viktor K. Prasanna, José D. P...