Sciweavers

15 search results - page 2 / 3
» Exact digital simulation of time-invariant linear systems wi...
Sort
View
IJON
2000
104views more  IJON 2000»
13 years 5 months ago
Harmonic analysis of spiking neuronal pairs
Harmonic analysis is applied to analyze the transmission of bandlimited signals via spike trains generated by a pair of leaky integrate-and-fire (LIF) model neurons organized in a...
Charles H. Anderson, Qingfeng Huang, John W. Clark

Book
4675views
15 years 2 months ago
Mathematics of The Discrete Fourier Transform (DFT) with Audio Applications
"The Discrete Fourier Transform (DFT) can be understood as a numerical approximation to the Fourier transform. However, the DFT has its own exact Fourier theory, which is the ...
Julius O. Smith III
ASIACRYPT
2006
Springer
13 years 9 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
CCS
2005
ACM
13 years 10 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
13 years 10 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...