Sciweavers

128 search results - page 26 / 26
» se 2007
Sort
View
CPHYSICS
2007
71views more  CPHYSICS 2007»
13 years 4 months ago
Simulation of n-qubit quantum systems. III. Quantum operations
During the last decade, several quantum information protocols, such as quantum key distribution, teleportation or quantum computation, have attracted a lot of interest. Despite th...
T. Radtke, S. Fritzsche
DAM
2007
106views more  DAM 2007»
13 years 4 months ago
On the generation of bicliques of a graph
This work describes a study on the generation of bicliques of a graph. We show that it is NP-complete to test whether a subset of the vertices of a graph is part of a biclique. We ...
Vânia M. F. Dias, Celina M. Herrera de Figue...
ISI
2008
Springer
13 years 4 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham