Sciweavers

Share
ISCI
2008
69views more  ISCI 2008»
9 years 8 months ago
Diameter variability of cycles and tori
Jeng-Jung Wang, Tung-Yang Ho, Daniela Ferrero, Tin...
ISCI
2008
160views more  ISCI 2008»
9 years 8 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
ISCI
2008
66views more  ISCI 2008»
9 years 8 months ago
An energy-efficient real-time scheduling scheme on dual-channel networks
The recent evolution of wireless sensor networks have yielded a demand to improve energy-efficient scheduling algorithms and energy-efficient medium access protocols. This paper p...
Mikyung Kang, Dong-In Kang, Jinwoo Suh, Junghoon L...
ISCI
2008
86views more  ISCI 2008»
9 years 8 months ago
On conditional diagnosability of the folded hypercubes
The n-dimensional folded hypercube FQn, a variation of the hypercube proposed by Ahmed et al. [A. El-Amawy, S. Latifi, Properties and performance of folded hypercubes, IEEE Transa...
Qiang Zhu 0003, San-Yang Liu, Min Xu
ISCI
2008
116views more  ISCI 2008»
9 years 8 months ago
On the J-divergence of intuitionistic fuzzy sets with its application to pattern recognition
The importance of suitable distance measures between intuitionistic fuzzy sets (IFSs) arises because of the role they play in the inference problem. A concept closely related to o...
Wen-Liang Hung, Miin-Shen Yang
ISCI
2008
74views more  ISCI 2008»
9 years 8 months ago
Domain semantics of possibility computations
Yixiang Chen, Hengyang Wu
ISCI
2008
166views more  ISCI 2008»
9 years 8 months ago
Incremental and interactive mining of web traversal patterns
Web mining involves the application of data mining techniques to large amounts of web-related data in order to improve web services. Web traversal pattern mining involves discover...
Yue-Shi Lee, Show-Jane Yen
ISCI
2008
102views more  ISCI 2008»
9 years 8 months ago
Random walk biclustering for microarray data
A biclustering algorithm, based on a greedy technique and enriched with a local search strategy to escape poor local minima, is proposed. The algorithm starts with an initial rand...
Fabrizio Angiulli, Eugenio Cesario, Clara Pizzuti
books