Sciweavers

780 search results - page 14 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
BIOINFORMATICS
2006
106views more  BIOINFORMATICS 2006»
15 years 15 days ago
Identification of biochemical networks by S-tree based genetic programming
Motivation: Most previous approaches to model biochemical networks havefocusedeither on the characterization of a networkstructurewith a number of components or on the estimation ...
Dong-Yeon Cho, Kwang-Hyun Cho, Byoung-Tak Zhang
116
Voted
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 4 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
90
Voted
FC
2010
Springer
180views Cryptology» more  FC 2010»
15 years 1 months ago
Lighten Encryption Schemes for Secure and Private RFID Systems
We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precis...
Sébastien Canard, Iwen Coisel, Jonathan Etr...
FSS
2006
154views more  FSS 2006»
15 years 13 days ago
Sequential Adaptive Fuzzy Inference System (SAFIS) for nonlinear system identification and prediction
In this paper, a Sequential Adaptive Fuzzy Inference System called SAFIS is developed based on the functional equivalence between a radial basis function network and a fuzzy infer...
Hai-Jun Rong, N. Sundararajan, Guang-Bin Huang, P....
113
Voted
GLOBECOM
2007
IEEE
15 years 6 months ago
A Busy-Tone Based MAC Scheme for Wireless Ad Hoc Networks Using Directional Antennas
— Applying directional antennas in wireless ad hoc networks offers numerous benefits, such as extended communication range, increased spatial reuse, improved capacity and suppre...
Hongning Dai, Kam-Wing Ng, Min-You Wu