Sciweavers

7971 search results - page 1584 / 1595
» On unbounded operators and applications
Sort
View
TIP
2010
160views more  TIP 2010»
14 years 4 months ago
Development and Optimization of Regularized Tomographic Reconstruction Algorithms Utilizing Equally-Sloped Tomography
We develop two new algorithms for tomographic reconstruction which incorporate the technique of equally-sloped tomography (EST) and allow for the optimized and flexible implementat...
Yu Mao, Benjamin P. Fahimian, Stanley Osher, Jianw...
TIP
2010
131views more  TIP 2010»
14 years 4 months ago
Orientation Modulation for Data Hiding in Clustered-Dot Halftone Prints
We present a new framework for data hiding in images printed with clustered dot halftones. Our application scenario, like other hardcopy embedding methods, encounters fundamental c...
Orhan Bulan, Gaurav Sharma, Vishal Monga
TIT
2010
111views Education» more  TIT 2010»
14 years 4 months ago
Designing floating codes for expected performance
Floating codes are codes designed to store multiple values in a Write Asymmetric Memory, with applications to flash memory. In this model, a memory consists of a block of n cells, ...
Flavio Chierichetti, Hilary Finucane, Zhenming Liu...
TON
2010
159views more  TON 2010»
14 years 4 months ago
Googling the internet: profiling internet endpoints via the world wide web
Understanding Internet access trends at a global scale, i.e., how people use the Internet, is a challenging problem that is typically addressed by analyzing network traces. However...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
101
Voted
TON
2010
151views more  TON 2010»
14 years 4 months ago
Measurement-Driven Guidelines for 802.11 WLAN Design
Dense deployments of WLANs suffer from increased interference and as a result, reduced capacity. There are three main functions used to improve the overall network capacity: a) in...
Ioannis Broustis, Konstantina Papagiannaki, Srikan...
« Prev « First page 1584 / 1595 Last » Next »