Sciweavers

1628 search results - page 74 / 326
» Compiler Construction Using Scheme
Sort
View
WADS
2007
Springer
165views Algorithms» more  WADS 2007»
15 years 6 months ago
A Near Linear Time Approximation Scheme for Steiner Tree Among Obstacles in the Plane
We present a polynomial-time approximation scheme (PTAS) for the Steiner tree problem with polygonal obstacles in the plane with running time O(n log2 n), where n denotes the numb...
Matthias Müller-Hannemann, Siamak Tazari
INFOCOM
2000
IEEE
15 years 4 months ago
Adaptive Two-Level Unequal Error Protection Convolutional Code Scheme for Wireless ATM Networks
Abstract—Because the wireless asynchronous transfer mode (ATM) networks are often constrained with the limited link bandwidth and error prone characteristics, forward error corre...
Zhenqiang Sun, Shigetomo Kimura, Yoshihiko Ebihara
ENTCS
2008
91views more  ENTCS 2008»
14 years 12 months ago
Newton's method and the Computational Complexity of the Fundamental Theorem of Algebra
Several different uses of Newton's method in connection with the Fundamental Theorem of Algebra are pointed out. Theoretical subdivision schemes have been combined with the n...
Prashant Batra
IJNSEC
2007
164views more  IJNSEC 2007»
14 years 11 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
INFOCOM
2012
IEEE
13 years 2 months ago
Enhanced wireless channel authentication using time-synched link signature
Abstract— Wireless link signature is a physical layer authentication mechanism, which uses the unique wireless channel characteristics between a transmitter and a receiver to pro...
Yao Liu, Peng Ning