Sciweavers

5864 search results - page 126 / 1173
» Can We Work around Numerical Methods
Sort
View
CSFW
2002
IEEE
15 years 9 months ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
ACIVS
2006
Springer
15 years 10 months ago
Alternative Fuzzy Clustering Algorithms with L1-Norm and Covariance Matrix
In fuzzy clustering, the fuzzy c-means (FCM) algorithm is the best known and most used method. Although FCM is a very useful method, it is sensitive to noise and outliers so that W...
Miin-Shen Yang, Wen-Liang Hung, Tsiung-Iou Chung
SIAMSC
2008
108views more  SIAMSC 2008»
15 years 4 months ago
A Nine Point Scheme for the Approximation of Diffusion Operators on Distorted Quadrilateral Meshes
A nine point scheme is presented for discretizing diffusion operators on distorted quadrilateral meshes. The advantage of this method is that highly distorted meshes can be used wi...
Zhiqiang Sheng, Guangwei Yuan
ANSS
1998
IEEE
15 years 8 months ago
An Adaptive Synchronization Protocol for Parallel Discrete Event Simulation
Simulation, especially discrete event simulation (DES), is used in a variety of disciplines where numerical methods are difficult or impossible to apply. One problem with this met...
Keith R. Bisset
148
Voted
ICRA
2000
IEEE
86views Robotics» more  ICRA 2000»
15 years 8 months ago
Forward Dynamics Algorithms for Multibody Chains and Contact
We describe a framework for derivation of several forward dynamics algorithms used in robotics. The framework is based on formulating an augmented system and performing block matr...
Dinesh K. Pai, Uri M. Ascher, Paul G. Kry