Sciweavers

402 search results - page 35 / 81
» Cryptosystems using Linear Groups
Sort
View
ADCM
1998
133views more  ADCM 1998»
14 years 9 months ago
Numerical exploitation of symmetry in integral equations
: Linear integral operators describing physical problems on symmetric domains often are equivariant, which means that they commute with certain symmetries, i.e., with a group of or...
Eugene L. Allgower, Kurt Georg
EUSFLAT
2003
175views Fuzzy Logic» more  EUSFLAT 2003»
14 years 11 months ago
A multiattribute decision making approach using intuitionistic fuzzy sets
The concept of intuitionistic fuzzy sets is the generalization of the concept of fuzzy sets. The theory of intuitionistic fuzzy sets is well suited to dealing with vagueness. Rece...
Deng-Feng Li, Jian-Bo Yang
ICCV
1998
IEEE
15 years 12 months ago
Design of Multi-Parameter Steerable Functions Using Cascade Basis Reduction
A new cascade basis reduction method of computing the optimal least-squares set of basis functions to steer a given function locally is presented. The method combines the Lie grou...
Patrick C. Teo, Yacov Hel-Or
JUCS
2008
122views more  JUCS 2008»
14 years 10 months ago
Using an Evolving Thematic Clustering in a Text Segmentation Process
Abstract: The thematic text segmentation task consists in identifying the most important thematic breaks in a document in order to cut it into homogeneous passages. We propose in t...
Sylvain Lamprier, Tassadit Amghar, Bernard Levrat,...
WISEC
2009
ACM
15 years 4 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...