Sciweavers

20197 search results - page 3607 / 4040
» Comparing Computational Power
Sort
View
CONCURRENCY
2007
75views more  CONCURRENCY 2007»
15 years 4 months ago
A distributed packed storage for large dense parallel in-core calculations
We propose in this paper a distributed packed storage format that exploits the symmetry or the triangular structure of a dense matrix. This format stores only half of the matrix w...
Marc Baboulin, Luc Giraud, Serge Gratton, Julien L...
IJNSEC
2006
143views more  IJNSEC 2006»
15 years 4 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 4 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
IJON
2006
117views more  IJON 2006»
15 years 4 months ago
EEG classification using generative independent component analysis
We present an application of Independent Component Analysis (ICA) to the discrimination of mental tasks for EEG-based Brain Computer Interface systems. ICA is most commonly used w...
Silvia Chiappa, David Barber
JCB
2008
170views more  JCB 2008»
15 years 4 months ago
Efficiently Identifying Max-Gap Clusters in Pairwise Genome Comparison
The spatial clustering of genes across different genomes has been used to study important problems in comparative genomics, from identification of operons to detection of homologo...
Xu Ling, Xin He, Dong Xin, Jiawei Han
« Prev « First page 3607 / 4040 Last » Next »