Sciweavers

630 search results - page 52 / 126
» Symbolic Domain Decomposition
Sort
View
ICIP
2004
IEEE
16 years 1 months ago
Redundant image representations in security applications
To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of no...
Philippe Jost, Pierre Vandergheynst, Pascal Frossa...
CHI
2002
ACM
16 years 7 days ago
Breakdown visualization: multiple foci polyarchies of values and attributes
Breakdown analysis involves decomposing data into subgroups to allow for comparison and identification of problem areas. Good analysis requires the ability to group data based on ...
Sandeep Prabhakar, Nathan Conklin, Chris North, Mu...
DATE
2009
IEEE
120views Hardware» more  DATE 2009»
15 years 6 months ago
Optimizing data flow graphs to minimize hardware implementation
Abstract - This paper describes an efficient graphbased method to optimize data-flow expressions for best hardware implementation. The method is based on factorization, common su...
Daniel Gomez-Prado, Q. Ren, Maciej J. Ciesielski, ...
ICPP
1996
IEEE
15 years 4 months ago
On the Scalability of 2-D Wavelet Transform Algorithms on Fine-grained Parallel Machines
: We study the scalability of 2-D discrete wavelet transform algorithms on fine-grained parallel architectures. The principal operation in the 2-D DWT is the filtering operation us...
Jamshed N. Patel, Ashfaq A. Khokhar, Leah H. Jamie...
CORR
2011
Springer
207views Education» more  CORR 2011»
14 years 6 months ago
The AllDifferent Constraint with Precedences
We propose ALLDIFFPREC, a new global constraint that combines together an ALLDIFFERENT constraint with precedence constraints that strictly order given pairs of variables. We ident...
Christian Bessiere, Nina Narodytska, Claude-Guy Qu...