نتایج جستجو برای: network 2000
تعداد نتایج: 832945 فیلتر نتایج به سال:
The human visual system plays a key role in the final perceived quality of the compressed images. It is therefore desirable to allow system designers and users to take advantage of the current knowledge of visual perception and models in a compression system. In this paper, we review the various tools in JPEG-2000 that allow its users to exploit many properties of the human visual system such a...
The CarTALK 2000 [1] project aims at the development of an Ad Hoc wireless network, which can be classified as fast moving outdoor network. Main characteristics of such a kind of network are the large and variable number of mobile terminals, an extremely dynamic network topology and stringent requirements related to broadcast warning messages. In order to satisfy the basic requirements of such ...
Let X be a definable C manifold, Y1, Y2 definably compact definable C r submanifolds of X such that dimY1 + dimY2 < dimX and Y1 has a trivial normal bundle. We prove that there exists a definable isotopy {hp}p∈J such that h0 = idX and h1(Y1) ∩ Y2 = ∅. 2010 Mathematics Subject Classification. 14P10, 14P20, 58A05, 03C64.
Project-based learning is an essential part of a software engineer's education. The learning achieved through projects can be improved through structured interaction between more experienced students and those students encountering their rst software engineering project. In this paper, we report on our experience over three years with trials of several forms of interaction between undergraduate...
JPEG2000 encryption has become a widely discussed topic and quite a number of contributions have been made. However, little is known about JPEG2000 compression parameters and their influence on the security and performance of format, compliant encryption schemes. In this work, a thorough analysis of this topic is presented with a focus on format-compliant packet body encryption as sketched in t...
In this work an efficient format-compliant encryption approach for regular languages is proposed, block-based cycle-walking. The approach can transparently trade-off security for efficiency and can be adjusted to the desired level of security. The relationship between the encryption of regular languages and the encryption of JPEG2000 bitstreams is established. Block-based cycle-walking for the ...
Future system development and management efforts must strive to institutionalize these gains and provide ongoing, incremental improvement in these areas. With the growth of e-commerce and further socioeconomic reliance on IT, the organizations that have achieved these gains will be well positioned to outdistance those who were less aggressive. Figure 1 depicts the silver linings and competitive...
Lantern Field is a communal, site-specific installation that takes shape as a spatially responsive audio-visual field. The public participates in the creation of the installation, resulting in shared ownership of the work between both the artists and participants. Furthermore, the installation takes new shape in each realization, both to incorporate the constraints and affordances of each speci...
A great deal of computation for JPEG2000 encoding is a redundancy when the compression rate is high. That is because many coded bit-streams will be truncated after the rate control of JPEG2000. In this paper, an effective scheme for JPEG2000 rate control is proposed. Through this scheme, the computation complexity for JPEG2000 entropy coding, that is, EBCOT Tier-I, can be greatly reduced almost...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید