Sciweavers

9521 search results - page 1814 / 1905
» Compiling with continuations, continued
Sort
View
132
Voted
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 3 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
JAIR
2008
93views more  JAIR 2008»
15 years 3 months ago
Spectrum of Variable-Random Trees
In this paper, we show that a continuous spectrum of randomisation exists, in which most existing tree randomisations are only operating around the two ends of the spectrum. That ...
Fei Tony Liu, Kai Ming Ting, Yang Yu, Zhi-Hua Zhou
JC
2008
53views more  JC 2008»
15 years 3 months ago
Relative widths of smooth functions determined by fractional order derivatives
For two subsets W and V of a normed space X. The relative Kolmogorov n-width of W relative to V in X is defined by Kn(W, V )X := inf Ln sup f W inf gV Ln f - g X, where the infimu...
Liu Yongping, Yang Lianhong
CORR
2007
Springer
114views Education» more  CORR 2007»
15 years 3 months ago
High Performance Direct Gravitational N-body Simulations on Graphics Processing Units
We present the results of gravitational direct N-body simulations using the commercial graphics processing units (GPU) NVIDIA Quadro FX1400 and GeForce 8800GTX, and compare the re...
Simon Portegies Zwart, Robert G. Belleman, Peter G...
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 3 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
« Prev « First page 1814 / 1905 Last » Next »