Sciweavers

750 search results - page 122 / 150
» Desires, Norms and Constraints
Sort
View
IAJIT
2008
191views more  IAJIT 2008»
14 years 12 months ago
Novel Image Compression Using Multiwavelets with SPECK Algorithm
: Compression is the process of representing information in a compact form so as to reduce the bit rate for transmission or storage while maintaining acceptable fidelity or data qu...
Sudhakar Radhakrishnan, Jayaraman Subramaniam
IJES
2008
102views more  IJES 2008»
14 years 11 months ago
Alternative application-specific processor architectures for fast arbitrary bit permutations
Block ciphers are used to encrypt data and provide data confidentiality. For interoperability reasons, it is desirable to support a variety of block ciphers efficiently. Of the bas...
Zhijie Jerry Shi, Xiao Yang, Ruby B. Lee
EWC
2006
101views more  EWC 2006»
14 years 11 months ago
Mesh size functions for implicit geometries and PDE-based gradient limiting
Mesh generation and mesh enhancement algorithms often require a mesh size function to specify the desired size of the elements. We present algorithms for automatic generation of a...
Per-Olof Persson
GRID
2006
Springer
14 years 11 months ago
Metascheduling Multiple Resource Types using the MMKP
Grid computing involves the transparent sharing of computational resources of many types by users across large geographic distances. The altruistic nature of many current grid reso...
Daniel C. Vanderster, Nikitas J. Dimopoulos, Randa...
DKE
2007
199views more  DKE 2007»
14 years 11 months ago
QMatch - Using paths to match XML schemas
Integration of multiple heterogeneous data sources continues to be a critical problem for many application domains and a challenge for researchers world-wide. With the increasing ...
Naiyana Tansalarak, Kajal T. Claypool