The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
Filters
Page 4345 of Mathematical Reviews Vol. , Issue 2000f
[page]
2000
Mathematical Reviews
(RCH-UCS-CP; Santiago); Viola, Alfredo (UR-UREP-CP; Montevideo) ; Munro, J. lan (3-WTRL-C; Waterloo, ON) The diagonal Poisson transform and its application to the analysis of a hashing scheme. ...
An accurate analysis of this algorithm is made by introducing a new transform, which we call the diagonal Poisson transform as it resembles the Pois- son transform. ...
Parallel Poisson disk sampling with spectrum analysis on surfaces
2010
ACM SIGGRAPH Asia 2010 papers on - SIGGRAPH ASIA '10
The ability to place surface samples with Poisson disk distribution can benefit a variety of graphics applications. ...
It is flexible and can be extended to adaptive sampling given a user-specified radius field. Our second contribution is a new method for analyzing the spectral quality of surface samples. ...
The authors would like to thank SIGGRAPH Asia anonymous reviewers for their feedback and comments. Rui Wang is supported in part by NSF grant CCF-0746577. ...
doi:10.1145/1866158.1866188
fatcat:sifrplifn5anfg5zucsugs6zxi
Parallel Poisson disk sampling with spectrum analysis on surfaces
2010
ACM SIGGRAPH Asia 2010 papers on - SIGGRAPH ASIA '10
The ability to place surface samples with Poisson disk distribution can benefit a variety of graphics applications. ...
It is flexible and can be extended to adaptive sampling given a user-specified radius field. Our second contribution is a new method for analyzing the spectral quality of surface samples. ...
The authors would like to thank SIGGRAPH Asia anonymous reviewers for their feedback and comments. Rui Wang is supported in part by NSF grant CCF-0746577. ...
doi:10.1145/1882262.1866188
fatcat:uruabfh3zvbqvdeu53lhaqhznm
Parallel Poisson disk sampling with spectrum analysis on surfaces
2010
ACM Transactions on Graphics
The ability to place surface samples with Poisson disk distribution can benefit a variety of graphics applications. ...
It is flexible and can be extended to adaptive sampling given a user-specified radius field. Our second contribution is a new method for analyzing the spectral quality of surface samples. ...
The authors would like to thank SIGGRAPH Asia anonymous reviewers for their feedback and comments. Rui Wang is supported in part by NSF grant CCF-0746577. ...
doi:10.1145/1882261.1866188
fatcat:lr3sylaj6nferjpa5z25trlqiu
An alternative for Wang tiles
2006
ACM Transactions on Graphics
Corner tiles, on the other hand, do impose restrictions on their diagonal neighbors, and thus are not subject to the corner problem. ...
Important applications of Wang tiles include texture synthesis, tilebased texture mapping, and generating Poisson disk distributions. ...
ACKNOWLEDGMENTS We would like to thank Wang Yue, Tuen-Young Ng, and Tiow-Seng Tan from the National University of Singapore for generating the corner tile sets for texture synthesis. ...
doi:10.1145/1183287.1183296
fatcat:2kw3acj265a2nk2i3yk2ybaxpa
Improved Top-Down Techniques in Differential Cryptanalysis
[chapter]
2015
Lecture Notes in Computer Science
In this paper we use a top-down approach which considers the given mapping as a black box, and uses only its input/output relations in order to obtain direct experimental estimates for its DDT entries ...
In addition, we show how to use our new techniques to attack a 1-key version of the iterated Even-Mansour scheme in the related key setting, obtaining the first generic attack on 4 rounds of this well-studied ...
More specifically, we can use our new diagonal algorithm of Section 4.1 in order to analyze the specific choice of P 2 in a particular incarnation of the Even-Mansour scheme, and find in it the highest ...
doi:10.1007/978-3-319-22174-8_8
fatcat:7vrlssyjr5bsrllghs2ebmggky
An efficient load balancing LQR controller in parallel database queries under random perturbations
2009
2009 IEEE International Conference on Control Applications
This work investigates the problem of dynamic, intra-query load balancing in parallel database queries across heterogeneous nodes in a way that takes into account the inherent cost of adaptations and thus ...
avoids both over-reacting and deciding when to adapt in a completely heuristic manner. ...
The problem of developing a load balancer that considers the overhead of its decisions, is transformed to the problem of defining the (potentially time-varying) Q and R matrices. ...
doi:10.1109/cca.2009.5280982
dblp:conf/IEEEcca/GounarisYP09
fatcat:u6gq3pm6yjehrizdz7hj3ibeum
SNR Maximization Hashing
2015
IEEE Transactions on Information Forensics and Security
We propose a novel robust hashing algorithm based on signal-to-noise ratio (SNR) maximization to learn compact binary codes, where the SNR metric is used to select a set of projection directions, and one ...
We also develop a multi-bit per projection algorithm to learn longer hash codes when the number of high-SNR projections is limited. ...
In Section III, we derive the SNR-MH algorithm and relate it to other hashing algorithms. ...
doi:10.1109/tifs.2015.2436871
fatcat:wdwjhhwldbhj3p33fiv7c2myum
A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications
2020
IEEE Access
In contrast to other forms of multimedia, videos are extensively utilized and streamed over the Internet and communication networks in numerous Internet of Multimedia Things (IoMT) applications. ...
Massive simulation results and security analysis are performed to substantiate that the suggested HEVC cryptosystem reveals astonishing robustness and security accomplishment in contrast to the literature ...
A chaotic cryptosystem is the application of the arithmetic and statistical principles of chaos maps to generate the chaotic sequences that are employed and exploited in cryptography schemes. ...
doi:10.1109/access.2020.3008644
fatcat:eyyfpd7zfbep5gdevvca2aeky4
An Effective Image Encryption Method Based on Space Filling Curve and Plaintext-Related Josephus Traversal
2020
IEEE Access
[14] proposed a new encryption scheme with three different operation modes based on a dual SFC and fractional wavelet transform (FrWT). ...
Differential attack analysis Differential attack analysis aims to make small changes to the original image, encrypt it, and analyze the cipher image to analyze its sensitivity to plaintext. ...
doi:10.1109/access.2020.3034666
fatcat:yrlmfha4zfexrfodptbgia2feu
Digital Image Authentication by DCT and RPM Based Watermarking
2016
IOSR Journal of Engineering
Digital watermarking has been proposed as a viable clarification to the necessity of copyright protection and authentication of multimedia system information in a networked environment, since it makes ...
possible to identify the author, owner, distributor or approved client of a document. ...
The SVD theorem decomposes a digital image A of size M × N, as: A = USVT , (1) where U and V are of size M×M, and N ×N respectively. S is a diagonal matrix containing the singular values. ...
doi:10.9790/3021-068013544
fatcat:7d4pdwf2knc37b7vdutporndfu
Analytical depoissonization and its applications
1998
Theoretical Computer Science
expansion of the sequence can be expressed in terms of the Poisson transform and its derivatives evaluated on the real line. ...
In combinatorics and analysis of algorithms a Poisson version of a problem (henceforth called Poisson model or poissonization) is often easier to solve than the original one, which we name here the Bernoulli ...
Philippe also contributed to some parts of the paper (e.g., Appendix B). We also thank numerous colleagues who worked with us on depoissonization results. We mention here: A. Fill, H-K. Hwang ...
doi:10.1016/s0304-3975(97)00167-9
fatcat:golvgdfyqneodjfrua64fnqni4
Online Load Balancing in Parallel Database Queries with Model Predictive Control
2012
2012 IEEE 28th International Conference on Data Engineering Workshops
The emphasis of our approach is on taking into account the inherent cost of adaptations with a view to avoiding over-reacting, which may lead to serious performance degradation. ...
., using a cloud infrastructure. The goal is to adaptively distribute the data to respond to changes in the environment, in such a way that all machines finish at the same time. ...
Acknowledgements: We would like to thank N. W. Paton from the University of Manchester, for providing the detailed query simulator that we used in our experiments. C. ...
doi:10.1109/icdew.2012.60
dblp:conf/icde/YfoulisG12
fatcat:enp2yg6sdvabvpfw636dqpetji
Prime gradient noise
2021
Computational Visual Media
A comparative spectral analysis of the proposed noise with other noises including lattice noises show that PGN significantly reduces axial correlation and hence, periodicity in the noise texture. ...
Traditional lattice noise functions such as Perlin noise, however, exhibit periodicity due to the axial correlation induced while hashing the lattice vertices to the gradients. ...
Acknowledgements This work is supported by the National Science and Engineering Research Council of Canada (NSERC) Discovery Grant No. 2019-05092. ...
doi:10.1007/s41095-021-0206-z
fatcat:vbz5kqnpzrd2fdfo6hvoldya3a
Average-Case Analysis of Algorithms and Data Structures
[chapter]
1990
Algorithms and Complexity
Its aim is to describe the main mathematical methods and applications in the average-case analysis of algorithms and data structures. ...
Next, we show how to apply these general methods to the analysis of sorting, searching, tree data structures, hashing, and dynamic algorithms. ...
Acknowledgment We thank Don Knuth for several helpful comments and suggestions. ...
doi:10.1016/b978-0-444-88071-0.50014-x
fatcat:eauf2fmxdjdelic2gnpqnloizi
« Previous
Showing results 1 — 15 out of 636 results