Sciweavers

151 search results - page 18 / 31
» Optimal (2, n) visual cryptographic schemes
Sort
View
58
Voted
ISCAS
2005
IEEE
106views Hardware» more  ISCAS 2005»
15 years 3 months ago
A generic multilevel multiplying D/A converter for pipelined ADCs
—State-of-art implementations of pipelined ADCs can only realize a multiplying DAC (MDAC) with (2n –1) levels. However, the number of levels needed to optimize the performance ...
Vivek Sharma, Un-Ku Moon, Gabor C. Temes
FOCS
2007
IEEE
15 years 4 months ago
Non-Linear Index Coding Outperforming the Linear Optimum
The following source coding problem was introduced by Birk and Kol: a sender holds a word x ∈ {0, 1}n , and wishes to broadcast a codeword to n receivers, R1, . . . , Rn. The re...
Eyal Lubetzky, Uri Stav
PODC
2006
ACM
15 years 3 months ago
Optimal-stretch name-independent compact routing in doubling metrics
We consider the problem of name-independent routing in doubling metrics. A doubling metric is a metric space whose doubling dimension is a constant, where the doubling dimension o...
Goran Konjevod, Andréa W. Richa, Donglin Xi...
TVCG
2008
178views more  TVCG 2008»
14 years 9 months ago
Animation of Orthogonal Texture Patterns for Vector Field Visualization
Abstract-- This paper introduces orthogonal vector field visualization on 2D manifolds: a representation by lines that are perpendicular to the input vector field. Line patterns ar...
Sven Bachthaler, Daniel Weiskopf
IFIP
2003
Springer
15 years 2 months ago
Collaborative and Distributed Computation in Mesh-Like Wireless Sensor Arrays
Sensor networks are being used for implementation of a large number of applications involving distributed and collaborative computation. Extensive research has focused upon design ...
Mitali Singh, Viktor K. Prasanna, José D. P...