نتایج جستجو برای: composite operations

تعداد نتایج: 256462  

2005
Daniela Berardi Diego Calvanese Giuseppe De Giacomo Richard Hull Massimo Mecella

In this paper we present Colombo, a framework in which web services are characterized in terms of (i) the atomic processes (i.e., operations) they can perform; (ii) their impact on the “real world” (modeled as a relational database); (iii) their transition-based behavior; and (iv) the messages they can send and receive (from/to other web services and “human” clients). As such, Colombo combines ...

2010
Gursel Turgut Mahmut Ulvi Kayalı Özkan Köse Lütfü Baş

Composite tissue loss in extremities involving neurovascular structures has been a major challenge for reconstructive surgeons. Reconstruction of large defects can only be achieved with microsurgical procedures. The success of free flap operations depends on the presence of healthy recipient vessels. In cases with no suitable donor artery and vein or in which even the use of vein grafts would n...

2006
Stefano Secci Brunilde Sansò

This paper deals with the insertion of a dedicated path protection strategy in the design of a novel optical network structure, called PetaWeb, that can reach a total capacity of several Pb/s (10 bit/s). Prior studies of the same authors have tackled the optimization of a PetaWeb network architecture with a regular composite-star topology and with a quasi-regular topology. In this paper, a prot...

Journal: :CoRR 2012
Abdoul Aziz Ciss Ahmed Youssef Ould Cheikh Djiby Sow

This paper introduces a new public key cryptosystem based on two hard problems : the cube root extraction modulo a composite moduli (which is equivalent to the factorisation of the moduli) and the discrete logarithm problem. These two hard problems are combined during the key generation, encryption and decryption phases. By combining the IFP and the DLP we introduce a secure and efficient publi...

2003
Ji-Young Oh Wolfgang Stuerzlinger

In the traditional design process for a 3D environment, people usually depict a rough prototype to verify their ideas, and iteratively modify its configuration until they are satisfied with the general layout. In this activity, one of the main operations is the rearrangement of single and composite parts of a scene. With current desktop Virtual Reality (VR) systems, selection and manipulation o...

1999
George D. Magoulas Vassilis P. Plagianakos Michael N. Vrahatis

Training algorithms suitable to work under imprecise conditions are proposed. They require only the algebraic sign of the error function or its gradient to be correct, and depending on the way they update the weights, they are analyzed as composite nonhear Successive OverRRlaxation (SOR) methods or composite nonlinear Jacobi methods, applied to the gradient of the error function. The local conv...

Journal: :Fundam. Inform. 2012
Anna Paszynska Ewa Grabska Maciej Paszynski

The first part of our paper presents a composite programmable graph grammar model for the self-adaptive two dimensional hp Finite Element Method algorithms (2D hp-FEM) with mixed triangular and rectangular finite elements. The two dimensional model is a starting point for the three dimensional model of self-adaptive hp-FEM presented in the second part of this paper. A computational mesh is repr...

2013
C M Shappert J T Merrill K R Brown J M Amini C Volin S C Doret H Hayden C-S Pai A W Harter

We present a microfabricated surface-electrode ion trap with a pair of integrated waveguides that generate a standing microwave field resonant with the 171Yb hyperfine qubit. The waveguides are engineered to position the wave antinode near the center of the trap, resulting in maximum field amplitude and uniformity along the trap axis. By calibrating the relative amplitudes and phases of the wav...

Journal: :J. Parallel Distrib. Comput. 1998
Gwan-Hwan Hwang Jenq Kuen Lee Roy Dz-Ching Ju

An increasing number of programming languages, such as Fortran 90 and APL, are providing a rich set of intrinsic array functions and array expressions. These constructs which constitute an important part of data parallel languages provide excellent opportunities for compiler optimizations. In this paper, we present a new approach to combine consecutive array operations or array expressions into...

Journal: :Signal Processing 2012
Kehao Wang Quan Liu Lin Chen

For reversible data hiding, the histogram-based difference expansion (DE) is one family of the generic methods where secret bits are embedded into an image by DE on prediction error. However, the ratio of the count of bit 0 to that of bit 1, embedded into the pixels with the same prediction error, will vary with the image and the secret bits, which leads to the embedding unbalance and image dis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید