Sciweavers

16404 search results - page 3045 / 3281
» A set coverage problem
Sort
View
COMCOM
2004
90views more  COMCOM 2004»
15 years 4 months ago
Understanding bandwidth-delay product in mobile ad hoc networks
Bandwidth-delay product (BDP) and its upper bound (BDP-UB) have been well-understood in wireline networks such as the Internet. However, they have not been carefully studied in th...
Kai Chen, Yuan Xue, Samarth H. Shah, Klara Nahrste...
COMBINATORICS
2002
92views more  COMBINATORICS 2002»
15 years 4 months ago
Pattern Avoidance in Permutations: Linear and Cyclic Orders
: We generalize the notion of pattern avoidance to arbitrary functions on ordered sets, and consider specifically three scenarios for permutations: linear, cyclic and hybrid, the f...
Antoine Vella
JASIS
2000
143views more  JASIS 2000»
15 years 4 months ago
Discovering knowledge from noisy databases using genetic programming
s In data mining, we emphasize the need for learning from huge, incomplete and imperfect data sets (Fayyad et al. 1996, Frawley et al. 1991, Piatetsky-Shapiro and Frawley, 1991). T...
Man Leung Wong, Kwong-Sak Leung, Jack C. Y. Cheng
JOC
2000
181views more  JOC 2000»
15 years 4 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
MTA
2000
165views more  MTA 2000»
15 years 4 months ago
Approximating Content-Based Object-Level Image Retrieval
Object-level image retrieval is an active area of research. Given an image, a human observerdoesnot see randomdots of colors. Rather,he she observesfamiliarobjectsin the image. The...
Wynne Hsu, Tat-Seng Chua, Hung Keng Pung
« Prev « First page 3045 / 3281 Last » Next »