نتایج جستجو برای: composite operations
تعداد نتایج: 256462 فیلتر نتایج به سال:
In this paper we present Colombo, a framework in which web services are characterized in terms of (i) the atomic processes (i.e., operations) they can perform; (ii) their impact on the “real world” (modeled as a relational database); (iii) their transition-based behavior; and (iv) the messages they can send and receive (from/to other web services and “human” clients). As such, Colombo combines ...
Composite tissue loss in extremities involving neurovascular structures has been a major challenge for reconstructive surgeons. Reconstruction of large defects can only be achieved with microsurgical procedures. The success of free flap operations depends on the presence of healthy recipient vessels. In cases with no suitable donor artery and vein or in which even the use of vein grafts would n...
This paper deals with the insertion of a dedicated path protection strategy in the design of a novel optical network structure, called PetaWeb, that can reach a total capacity of several Pb/s (10 bit/s). Prior studies of the same authors have tackled the optimization of a PetaWeb network architecture with a regular composite-star topology and with a quasi-regular topology. In this paper, a prot...
This paper introduces a new public key cryptosystem based on two hard problems : the cube root extraction modulo a composite moduli (which is equivalent to the factorisation of the moduli) and the discrete logarithm problem. These two hard problems are combined during the key generation, encryption and decryption phases. By combining the IFP and the DLP we introduce a secure and efficient publi...
In the traditional design process for a 3D environment, people usually depict a rough prototype to verify their ideas, and iteratively modify its configuration until they are satisfied with the general layout. In this activity, one of the main operations is the rearrangement of single and composite parts of a scene. With current desktop Virtual Reality (VR) systems, selection and manipulation o...
Training algorithms suitable to work under imprecise conditions are proposed. They require only the algebraic sign of the error function or its gradient to be correct, and depending on the way they update the weights, they are analyzed as composite nonhear Successive OverRRlaxation (SOR) methods or composite nonlinear Jacobi methods, applied to the gradient of the error function. The local conv...
The first part of our paper presents a composite programmable graph grammar model for the self-adaptive two dimensional hp Finite Element Method algorithms (2D hp-FEM) with mixed triangular and rectangular finite elements. The two dimensional model is a starting point for the three dimensional model of self-adaptive hp-FEM presented in the second part of this paper. A computational mesh is repr...
We present a microfabricated surface-electrode ion trap with a pair of integrated waveguides that generate a standing microwave field resonant with the 171Yb hyperfine qubit. The waveguides are engineered to position the wave antinode near the center of the trap, resulting in maximum field amplitude and uniformity along the trap axis. By calibrating the relative amplitudes and phases of the wav...
An increasing number of programming languages, such as Fortran 90 and APL, are providing a rich set of intrinsic array functions and array expressions. These constructs which constitute an important part of data parallel languages provide excellent opportunities for compiler optimizations. In this paper, we present a new approach to combine consecutive array operations or array expressions into...
Hierarchical reversible data hiding based on statistical information: Preventing embedding unbalance
For reversible data hiding, the histogram-based difference expansion (DE) is one family of the generic methods where secret bits are embedded into an image by DE on prediction error. However, the ratio of the count of bit 0 to that of bit 1, embedded into the pixels with the same prediction error, will vary with the image and the secret bits, which leads to the embedding unbalance and image dis...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید