Sciweavers

151 search results - page 19 / 31
» Optimal (2, n) visual cryptographic schemes
Sort
View
IPPS
2005
IEEE
14 years 29 days ago
Distributed Scheduling of Parallel I/O in the Presence of Data Replication
This paper studies distributed scheduling of parallel I/O data transfers on systems that provide data replication. In our previous work, we proposed a centralized algorithm for so...
Jan-Jan Wu, Pangfeng Liu
SPAA
2010
ACM
14 years 6 days ago
Tree network coding for peer-to-peer networks
Partitioning is the dominant technique to transmit large files in peer-to-peer networks. A peer can redistribute each part immediately after its download. BitTorrent combines thi...
Arne Vater, Christian Schindelhauer, Christian Ort...
GLOBECOM
2009
IEEE
14 years 2 months ago
Rate Adaptation with NAK-Aided Loss Differentiation in 802.11 Wireless Networks
—The Physical Layer of the IEEE 802.11 standard family provides a set of different modulation and coding schemes and, thus, a multitude of data rates. However, the Standard itsel...
Anne N. Ngugi, Yuanzhu Peter Chen, Qing Li
ISCAPDCS
2001
13 years 8 months ago
Optimal Broadcasting in Injured Hypercubes Using Directed Safety Levels
Reliable communication in injured hypercubes with faulty links/nodes using directed safety levels is studied in this paper. In this approach, each node u in an n-dimensional hyper...
Jie Wu
VIS
2009
IEEE
158views Visualization» more  VIS 2009»
14 years 8 months ago
A Novel Interface for Interactive Exploration of DTI Fibers
Visual exploration is essential to the visualization and analysis of densely sampled 3D DTI fibers in biological speciments, due to the high geometric, spatial, and anatomical comp...
Wei Chen, Zi’ang Ding, Song Zhang, Anna MacKay...