Sciweavers

628 search results - page 69 / 126
» Distance Field Compression
Sort
View
99
Voted
DCC
2006
IEEE
16 years 11 days ago
Evaluation codes and plane valuations
Abstract. We apply tools coming from singularity theory, as Hamburger-Noether expansions, and from valuation theory, as generating sequences, to explicitly describe order functions...
C. Galindo, M. Sanchis
ISQED
2010
IEEE
105views Hardware» more  ISQED 2010»
15 years 5 months ago
Leakage current analysis for intra-chip wireless interconnects
A simulation-based feasibility study of an intra-chip wireless interconnect system is presented. The wireless interconnect system is modelled in a 250 nm standard complementary met...
Ankit More, Baris Taskin
101
Voted
ECAI
2006
Springer
15 years 4 months ago
Time Constrained VRP: An Agent Environment-Perception Model
In this paper, we present a multiagent model in which agents have a perception upon their shared environment, a measure is associated to the agents' perception field. We apply...
Mahdi Zargayouna
TCSV
2008
156views more  TCSV 2008»
15 years 20 days ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
85
Voted
CASES
2001
ACM
15 years 4 months ago
Heads and tails: a variable-length instruction format supporting parallel fetch and decode
Abstract. Existing variable-length instruction formats provide higher code densities than fixed-length formats, but are ill-suited to pipelined or parallel instruction fetch and de...
Heidi Pan, Krste Asanovic