Sciweavers

32545 search results - page 6471 / 6509
» Data Structures and Algorithms
Sort
View
CORR
2010
Springer
169views Education» more  CORR 2010»
14 years 11 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
118
Voted
CORR
2010
Springer
165views Education» more  CORR 2010»
14 years 11 months ago
Coalition Formation Games for Distributed Cooperation Among Roadside Units in Vehicular Networks
Vehicle-to-roadside (V2R) communications enable vehicular networks to support a wide range of applications for enhancing the efficiency of road transportation. While existing work...
Walid Saad, Zhu Han, Are Hjørungnes, Dusit ...
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 11 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
CSE
2010
IEEE
14 years 11 months ago
MCALab: Reproducible Research in Signal and Image Decomposition and Inpainting
Morphological Component Analysis (MCA) of signals and images is an ambitious and important goal in signal processing; successful methods for MCA have many far-reaching application...
Mohamed-Jalal Fadili, Jean-Luc Starck, Michael Ela...
DAM
2008
136views more  DAM 2008»
14 years 11 months ago
General theory of information transfer: Updated
We report on ideas, problems and results, which occupied us during the past decade and which seem to extend the frontiers of information theory in several directions. The main con...
Rudolf Ahlswede
« Prev « First page 6471 / 6509 Last » Next »