Sciweavers

151 search results - page 20 / 31
» Optimal (2, n) visual cryptographic schemes
Sort
View
SIAMSC
2008
179views more  SIAMSC 2008»
13 years 7 months ago
Multigrid Algorithms for Inverse Problems with Linear Parabolic PDE Constraints
Abstract. We present a multigrid algorithm for the solution of distributed parameter inverse problems constrained by variable-coefficient linear parabolic partial differential equa...
Santi S. Adavani, George Biros
INFOCOM
2010
IEEE
13 years 5 months ago
On the Fundamental Limits of Broadcasting in Wireless Mobile Networks
Abstract—In this paper, we investigate the fundamental properties of broadcasting in mobile wireless networks. In particular, we characterize broadcast capacity and latency of a ...
Giovanni Resta, Paolo Santi
CCS
2008
ACM
13 years 9 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
NETWORKS
2007
13 years 6 months ago
Vertex disjoint routings of cycles over tori
We study the problem of designing a survivable WDM network based on covering the communication requests with subnetworks that are protected independently from each other. We consi...
Jean-Claude Bermond, Min-Li Yu
3DPVT
2002
IEEE
130views Visualization» more  3DPVT 2002»
14 years 10 days ago
ATTEST: Advanced Three-dimensional Television System Technologies
We describe the goals of the ATTEST project, which started in March 2002 as part of the Information Society Technologies (IST) programme, sponsored by the European Commission. In ...
André Redert, Marc Op de Beeck, Christoph F...