Sciweavers

14774 search results - page 2796 / 2955
» Computational complexity and evolutionary computation
Sort
View
178
Voted
WCNC
2010
IEEE
15 years 2 months ago
Physical Layer Network Coding with Multiple Antennas
: The two-phase MIMO NC (network coding) scheme can be used to boost the throughput in a two-way relay channel in which nodes are equipped with multiple antennas. The obvious strat...
Shengli Zhang, Soung Chang Liew
DLT
2009
15 years 2 months ago
Branching-Time Temporal Logics with Minimal Model Quantifiers
Abstract. Temporal logics are a well investigated formalism for the specification and verification of reactive systems. Using formal verification techniques, we can ensure the corr...
Fabio Mogavero, Aniello Murano
EUROPKI
2009
Springer
15 years 2 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
GI
2009
Springer
15 years 2 months ago
AnToNIa: A Software Tool for the Hemodynamic Analysis of Cerebral Vascular Malformations Using 3D and 4D MRA Image Sequences
Abstract: Stroke is the second most common cause of death and major cause of disability worldwide. Approx. 20% of cerebral strokes are caused by hemorrhages due to rupture of cereb...
Nils Daniel Forkert, Dennis Säring, Jens Fieh...
GI
2009
Springer
15 years 2 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
« Prev « First page 2796 / 2955 Last » Next »