Sciweavers

1188 search results - page 106 / 238
» Generating Connectives
Sort
View
141
Voted
IPCCC
2005
IEEE
15 years 9 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
GFKL
2005
Springer
95views Data Mining» more  GFKL 2005»
15 years 9 months ago
An Indicator for the Number of Clusters: Using a Linear Map to Simplex Structure
Abstract. The problem of clustering data can be formulated as a graph partitioning problem. In this setting, spectral methods for obtaining optimal solutions have received a lot of...
Marcus Weber, Wasinee Rungsarityotin, Alexander Sc...
119
Voted
ICANN
2005
Springer
15 years 9 months ago
Associative Learning in Hierarchical Self Organizing Learning Arrays
In this paper we introduce feedback based associative learning in self-organized learning arrays (SOLAR). SOLAR structures are hierarchically organized and have the ability to clas...
Janusz A. Starzyk, Zhen Zhu, Yue Li
117
Voted
ISCIS
2005
Springer
15 years 9 months ago
Generalizing Redundancy Elimination in Checking Sequences
Abstract. Based on a distinguishing sequence for a Finite State Machine (FSM), an efficient checking sequence may be produced from the elements of a set Eα of α –sequences and ...
K. Tuncay Tekle, Hasan Ural, M. Cihan Yalcin, H&uu...
108
Voted
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 9 months ago
Reading movies: an integrated DVD player for browsing movies and their scripts
We have built over the last few years an integrated browser and query interface for watching a movie synchronized with its script. The system is demonstrated with the movie ’The...
Rémi Ronfard