Filters








636 Hits in 6.0 sec

Page 4345 of Mathematical Reviews Vol. , Issue 2000f [page]

2000 Mathematical Reviews  
(RCH-UCS-CP; Santiago); Viola, Alfredo (UR-UREP-CP; Montevideo) ; Munro, J. lan (3-WTRL-C; Waterloo, ON) The diagonal Poisson transform and its application to the analysis of a hashing scheme.  ...  An accurate analysis of this algorithm is made by introducing a new transform, which we call the diagonal Poisson transform as it resembles the Pois- son transform.  ... 

Parallel Poisson disk sampling with spectrum analysis on surfaces

John Bowers, Rui Wang, Li-Yi Wei, David Maletz
2010 ACM SIGGRAPH Asia 2010 papers on - SIGGRAPH ASIA '10  
The ability to place surface samples with Poisson disk distribution can benefit a variety of graphics applications.  ...  It is flexible and can be extended to adaptive sampling given a user-specified radius field. Our second contribution is a new method for analyzing the spectral quality of surface samples.  ...  The authors would like to thank SIGGRAPH Asia anonymous reviewers for their feedback and comments. Rui Wang is supported in part by NSF grant CCF-0746577.  ... 
doi:10.1145/1866158.1866188 fatcat:sifrplifn5anfg5zucsugs6zxi

Parallel Poisson disk sampling with spectrum analysis on surfaces

John Bowers, Rui Wang, Li-Yi Wei, David Maletz
2010 ACM SIGGRAPH Asia 2010 papers on - SIGGRAPH ASIA '10  
The ability to place surface samples with Poisson disk distribution can benefit a variety of graphics applications.  ...  It is flexible and can be extended to adaptive sampling given a user-specified radius field. Our second contribution is a new method for analyzing the spectral quality of surface samples.  ...  The authors would like to thank SIGGRAPH Asia anonymous reviewers for their feedback and comments. Rui Wang is supported in part by NSF grant CCF-0746577.  ... 
doi:10.1145/1882262.1866188 fatcat:uruabfh3zvbqvdeu53lhaqhznm

Parallel Poisson disk sampling with spectrum analysis on surfaces

John Bowers, Rui Wang, Li-Yi Wei, David Maletz
2010 ACM Transactions on Graphics  
The ability to place surface samples with Poisson disk distribution can benefit a variety of graphics applications.  ...  It is flexible and can be extended to adaptive sampling given a user-specified radius field. Our second contribution is a new method for analyzing the spectral quality of surface samples.  ...  The authors would like to thank SIGGRAPH Asia anonymous reviewers for their feedback and comments. Rui Wang is supported in part by NSF grant CCF-0746577.  ... 
doi:10.1145/1882261.1866188 fatcat:lr3sylaj6nferjpa5z25trlqiu

An alternative for Wang tiles

Ares Lagae, Philip Dutré
2006 ACM Transactions on Graphics  
Corner tiles, on the other hand, do impose restrictions on their diagonal neighbors, and thus are not subject to the corner problem.  ...  Important applications of Wang tiles include texture synthesis, tilebased texture mapping, and generating Poisson disk distributions.  ...  ACKNOWLEDGMENTS We would like to thank Wang Yue, Tuen-Young Ng, and Tiow-Seng Tan from the National University of Singapore for generating the corner tile sets for texture synthesis.  ... 
doi:10.1145/1183287.1183296 fatcat:2kw3acj265a2nk2i3yk2ybaxpa

Improved Top-Down Techniques in Differential Cryptanalysis [chapter]

Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir
2015 Lecture Notes in Computer Science  
In this paper we use a top-down approach which considers the given mapping as a black box, and uses only its input/output relations in order to obtain direct experimental estimates for its DDT entries  ...  In addition, we show how to use our new techniques to attack a 1-key version of the iterated Even-Mansour scheme in the related key setting, obtaining the first generic attack on 4 rounds of this well-studied  ...  More specifically, we can use our new diagonal algorithm of Section 4.1 in order to analyze the specific choice of P 2 in a particular incarnation of the Even-Mansour scheme, and find in it the highest  ... 
doi:10.1007/978-3-319-22174-8_8 fatcat:7vrlssyjr5bsrllghs2ebmggky

An efficient load balancing LQR controller in parallel database queries under random perturbations

Anastasios Gounaris, Christos A. Yfoulis, Norman W. Paton
2009 2009 IEEE International Conference on Control Applications  
This work investigates the problem of dynamic, intra-query load balancing in parallel database queries across heterogeneous nodes in a way that takes into account the inherent cost of adaptations and thus  ...  avoids both over-reacting and deciding when to adapt in a completely heuristic manner.  ...  The problem of developing a load balancer that considers the overhead of its decisions, is transformed to the problem of defining the (potentially time-varying) Q and R matrices.  ... 
doi:10.1109/cca.2009.5280982 dblp:conf/IEEEcca/GounarisYP09 fatcat:u6gq3pm6yjehrizdz7hj3ibeum

SNR Maximization Hashing

Honghai Yu, Pierre Moulin
2015 IEEE Transactions on Information Forensics and Security  
We propose a novel robust hashing algorithm based on signal-to-noise ratio (SNR) maximization to learn compact binary codes, where the SNR metric is used to select a set of projection directions, and one  ...  We also develop a multi-bit per projection algorithm to learn longer hash codes when the number of high-SNR projections is limited.  ...  In Section III, we derive the SNR-MH algorithm and relate it to other hashing algorithms.  ... 
doi:10.1109/tifs.2015.2436871 fatcat:wdwjhhwldbhj3p33fiv7c2myum

A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications

Abdulaziz Alarifi, Syam Sankar, Torki Altameem, K.C. Jithin, Mohammed Amoon, Walid El-Shafai
2020 IEEE Access  
In contrast to other forms of multimedia, videos are extensively utilized and streamed over the Internet and communication networks in numerous Internet of Multimedia Things (IoMT) applications.  ...  Massive simulation results and security analysis are performed to substantiate that the suggested HEVC cryptosystem reveals astonishing robustness and security accomplishment in contrast to the literature  ...  A chaotic cryptosystem is the application of the arithmetic and statistical principles of chaos maps to generate the chaotic sequences that are employed and exploited in cryptography schemes.  ... 
doi:10.1109/access.2020.3008644 fatcat:eyyfpd7zfbep5gdevvca2aeky4

An Effective Image Encryption Method Based on Space Filling Curve and Plaintext-Related Josephus Traversal

Ying Niu, Xuncai Zhang
2020 IEEE Access  
[14] proposed a new encryption scheme with three different operation modes based on a dual SFC and fractional wavelet transform (FrWT).  ...  Differential attack analysis Differential attack analysis aims to make small changes to the original image, encrypt it, and analyze the cipher image to analyze its sensitivity to plaintext.  ... 
doi:10.1109/access.2020.3034666 fatcat:yrlmfha4zfexrfodptbgia2feu

Digital Image Authentication by DCT and RPM Based Watermarking

Kuldeep Singh, Prof. Ashish Mishra
2016 IOSR Journal of Engineering  
Digital watermarking has been proposed as a viable clarification to the necessity of copyright protection and authentication of multimedia system information in a networked environment, since it makes  ...  possible to identify the author, owner, distributor or approved client of a document.  ...  The SVD theorem decomposes a digital image A of size M × N, as: A = USVT , (1) where U and V are of size M×M, and N ×N respectively. S is a diagonal matrix containing the singular values.  ... 
doi:10.9790/3021-068013544 fatcat:7d4pdwf2knc37b7vdutporndfu

Analytical depoissonization and its applications

Philippe Jacquet, Wojciech Szpankowski
1998 Theoretical Computer Science  
expansion of the sequence can be expressed in terms of the Poisson transform and its derivatives evaluated on the real line.  ...  In combinatorics and analysis of algorithms a Poisson version of a problem (henceforth called Poisson model or poissonization) is often easier to solve than the original one, which we name here the Bernoulli  ...  Philippe also contributed to some parts of the paper (e.g., Appendix B). We also thank numerous colleagues who worked with us on depoissonization results. We mention here: A. Fill, H-K. Hwang  ... 
doi:10.1016/s0304-3975(97)00167-9 fatcat:golvgdfyqneodjfrua64fnqni4

Online Load Balancing in Parallel Database Queries with Model Predictive Control

Christos A. Yfoulis, Anastasios Gounaris
2012 2012 IEEE 28th International Conference on Data Engineering Workshops  
The emphasis of our approach is on taking into account the inherent cost of adaptations with a view to avoiding over-reacting, which may lead to serious performance degradation.  ...  ., using a cloud infrastructure. The goal is to adaptively distribute the data to respond to changes in the environment, in such a way that all machines finish at the same time.  ...  Acknowledgements: We would like to thank N. W. Paton from the University of Manchester, for providing the detailed query simulator that we used in our experiments. C.  ... 
doi:10.1109/icdew.2012.60 dblp:conf/icde/YfoulisG12 fatcat:enp2yg6sdvabvpfw636dqpetji

Prime gradient noise

Sheldon Taylor, Owen Sharpe, Jiju Peethambaran
2021 Computational Visual Media  
A comparative spectral analysis of the proposed noise with other noises including lattice noises show that PGN significantly reduces axial correlation and hence, periodicity in the noise texture.  ...  Traditional lattice noise functions such as Perlin noise, however, exhibit periodicity due to the axial correlation induced while hashing the lattice vertices to the gradients.  ...  Acknowledgements This work is supported by the National Science and Engineering Research Council of Canada (NSERC) Discovery Grant No. 2019-05092.  ... 
doi:10.1007/s41095-021-0206-z fatcat:vbz5kqnpzrd2fdfo6hvoldya3a

Average-Case Analysis of Algorithms and Data Structures [chapter]

Jeffrey Scott VITTER, Philippe FLAJOLET
1990 Algorithms and Complexity  
Its aim is to describe the main mathematical methods and applications in the average-case analysis of algorithms and data structures.  ...  Next, we show how to apply these general methods to the analysis of sorting, searching, tree data structures, hashing, and dynamic algorithms.  ...  Acknowledgment We thank Don Knuth for several helpful comments and suggestions.  ... 
doi:10.1016/b978-0-444-88071-0.50014-x fatcat:eauf2fmxdjdelic2gnpqnloizi
« Previous Showing results 1 — 15 out of 636 results