Search
Now showing items 3991-4000 of 4210
Spline wavelet image coding and synthesis for a VLSI based difference engine
(1994)
The efficiency of an image compression/synthesis system based on a spline multi-resolution analysis (MRA) is investigated. The proposed system uses a quadratic spline wavelet transform combined with minimum-mean squared ...
Participatory cloud computing : the community cloud management protocol
(2014)
This thesis work takes an investigative approach into developing a middleware solution for managing services in a community cloud computing infrastructure pre-dominantly made of interconnected low power wireless devices. ...
Analytical performance evaluation of concurrent communicating systems using SLD and stochastic Petri nets
(1997)
In this thesis, the performance analysis of SDL with a new type of stochastic Petri net is described. This new net is called SDL-net. The Concurrent Communicating System is described, and the need for qualitative and ...
The influence of protocol choice on network performance
(1995)
Computer communication networks are a vital link in providing many of the services that we use daily, and our reliance on these networks is on the increase. The growing use of networks is driving network design towards ...
A workflow for geocoding South African addresses
(2015)
There are many industries that have long been utilizing Geographical Information Systems (GIS) for spatial analysis. In many parts of the world, it has gained less popularity because of inaccurate geocoding methods and a ...
Visualizing the performance of parallel programs
(1996)
The performance analysis of parallel programs is a complex task, particularly if the program has to be efficient over a wide range of parallel machines. We have designed a performance analysis system called Chiron that ...
Improving the usability of the hierarchical file system
(South African Institute of Computer Scientists and Information Technologists, 2004)
Whether you are interested in improving the usability of Linux, Macintosh or Windows, there is one restriction you cannot escape - the hierarchical file storage system. The notion of files and folders has been with us for ...
A component assembly approach to digital library systems
(2005)
With the advent of the Internet came the promise of global information access. In keeping with this promise, Digital Libraries (DLs) began to emerge across the world as a method of providing structured information to their ...
High fidelity compression of irregularly sampled height fields
(2007)
This paper presents a method to compress irregularly sampled height-fields based on a multi-resolution framework. Unlike many other height-field compression techniques, no resampling is required so the original height-field ...
Attack analysis of cryptographic protocols using strand spaces
(2003)
Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security ...