Sciweavers

23119 search results - page 4574 / 4624
» From Domain to Requirements
Sort
View
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 11 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
CORR
2010
Springer
136views Education» more  CORR 2010»
14 years 11 months ago
Maximum Bipartite Matching Size And Application to Cuckoo Hashing
Cuckoo hashing with a stash is a robust high-performance hashing scheme that can be used in many real-life applications. It complements cuckoo hashing by adding a small stash stor...
Josef Kanizo, David Hay, Isaac Keslassy
JAPLL
2007
104views more  JAPLL 2007»
14 years 11 months ago
An axiomatization of family resemblance
We invoke concepts from the theory of hypergraphs to give a measure of the closeness of family resemblance, and to make precise the idea of a composite likeness. It is shown that f...
Ray E. Jennings, Dorian X. Nicholson
MTA
2007
140views more  MTA 2007»
14 years 11 months ago
Motion mapping and mode decision for MPEG-2 to H.264/AVC transcoding
This paper describes novel transcoding techniques aimed for low-complexity MPEG-2 to H.264/AVC transcoding. An important application for this type of conversion is efficient stor...
Jun Xin, Jianjun Li, Anthony Vetro, Shun-ichi Seki...
NAR
2007
216views more  NAR 2007»
14 years 11 months ago
SYSTOMONAS - an integrated database for systems biology analysis of Pseudomonas
To provide an integrated bioinformatics platform for a systems biology approach to the biology of pseudomonads in infection and biotechnology the database SYSTOMONAS (SYSTems biol...
Claudia Choi, Richard Münch, Stefan Leupold, ...
« Prev « First page 4574 / 4624 Last » Next »