46 research outputs found

    Performance and policy dimensions in internet routing

    Get PDF
    The Internet Routing Project, referred to in this report as the 'Highball Project', has been investigating architectures suitable for networks spanning large geographic areas and capable of very high data rates. The Highball network architecture is based on a high speed crossbar switch and an adaptive, distributed, TDMA scheduling algorithm. The scheduling algorithm controls the instantaneous configuration and swell time of the switch, one of which is attached to each node. In order to send a single burst or a multi-burst packet, a reservation request is sent to all nodes. The scheduling algorithm then configures the switches immediately prior to the arrival of each burst, so it can be relayed immediately without requiring local storage. Reservations and housekeeping information are sent using a special broadcast-spanning-tree schedule. Progress to date in the Highball Project includes the design and testing of a suite of scheduling algorithms, construction of software reservation/scheduling simulators, and construction of a strawman hardware and software implementation. A prototype switch controller and timestamp generator have been completed and are in test. Detailed documentation on the algorithms, protocols and experiments conducted are given in various reports and papers published. Abstracts of this literature are included in the bibliography at the end of this report, which serves as an extended executive summary

    Gradient-based Edge Detection Using Nonlinear Edge-enhancing Prefilters

    No full text
    This correspondence examines the use of nonlinear edge enhancers as prefilters for edge detectors. The filters are able to convert smooth edges to step edges and suppress noise simultaneously. Thus, false alarms due to noise are minimized and edge gradient estimates tend to be large and localized. This leads to significantly improved edge maps

    Spread spectrum image steganography

    No full text

    LUM Filters: A Class of Rank-order-based Filters for Smoothing and Sharpening

    No full text
    A new class of rank-order-based filters, called lower-upper-middle (LUM) filters, is introduced. The output of these filters is determined by comparing a lower- and an upper-order statistic to the middle sample in the filter window. These filters can be designed for smoothing and sharpening, or outlier rejection. The level of smoothing done by the filter can range from no smoothing to that of the medianfilter. This flexibility allows the LUM filter to be designed to best balance the tradeoffs between noisesmoothing and signal detail preservation. LUM filters for enhancing edge gradients can be designed to be insensitive to low levels of additive noise and to remove impulsive noise. Furthermore, LUM filters do not cause overshoot or undershoot. Some statistical and deterministic properties of the LUM filters are developed, and a number of experimental results are presented to illustrate the performance. These experiments include applications to 1D signals and to images

    Spread Spectrum Image Steganography

    No full text
    In this paper we present a new method of digital steganography, entitled Spread Spectrum Image Steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, errorcontrol coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embe..

    Robust source coding of images for very noisy channels

    No full text
    corecore