Sciweavers

12 search results - page 1 / 3
» Some Applications of Weakly Picard Operators
Sort
View
SYNASC
2007
IEEE
138views Algorithms» more  SYNASC 2007»
13 years 11 months ago
Some Applications of Weakly Picard Operators
Abstract. In this paper we give some applications of weakly Picard operators theory to linear positive approximation operators, to difference equations with deviating argument and...
Ioan A. Rus
ISPASS
2007
IEEE
13 years 11 months ago
Performance Impact of Unaligned Memory Operations in SIMD Extensions for Video Codec Applications
—Although SIMD extensions are a cost effective way to exploit the data level parallelism present in most media applications, we will show that they had have a very limited memory...
Mauricio Alvarez, Esther Salamí, Alex Ram&i...
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
13 years 11 months ago
Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption
Content-dependent watermarking (CDWM) has been proposed as a solution to overcome the potential estimation attack aiming to recover and remove the watermark from the host signal. ...
Zhi Li, Xinglei Zhu, Yong Lian, Qibin Sun
IJNS
2000
130views more  IJNS 2000»
13 years 4 months ago
A Programmable VLSI Filter Architecture for Application in Real-Time Vision Processing Systems
An architecture is proposed for the realization of real-time edge-extraction filtering operation in an Address-Event-Representation (AER) vision system. Furthermore, the approach ...
Teresa Serrano-Gotarredona, Andreas G. Andreou, Be...
CCGRID
2002
IEEE
13 years 9 months ago
The Internet Backplane Protocol: A Study in Resource Sharing
In this work we present the Internet Backplane Protocol (IBP), a middleware created to allow the sharing of storage resources, implemented as part of the network fabric. IBP allow...
Alessandro Bassi, Micah Beck, Graham E. Fagg, Terr...