Sciweavers

318 search results - page 8 / 64
» On the Computational Power of 1-Deterministic and Sequential...
Sort
View
ARITH
2003
IEEE
15 years 3 months ago
High-Radix Iterative Algorithm for Powering Computation
A high-radix composite algorithm for the computation of the powering function (¤¦¥ ) is presented in this paper. The algorithm consists of a sequence of overlapped operations: ...
José-Alejandro Piñeiro, Milos D. Erc...
MEMBRANE
2007
Springer
15 years 3 months ago
Conformon-P Systems with Negative Values
Some initial results on the study of conformon-P systems with negative values are reported. One model of these conformon-P systems is proved to be computationally universal while a...
Pierluigi Frisco
WWW
2003
ACM
15 years 10 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
GW
2005
Springer
120views Biometrics» more  GW 2005»
15 years 3 months ago
Recognition of Deictic Gestures for Wearable Computing
In modern society there is an increasing demand to access, record and manipulate large amounts of information. This has inspired a new approach to thinking about and designing pers...
Thomas B. Moeslund, Lau Nørgaard
NC
2008
126views Neural Networks» more  NC 2008»
14 years 9 months ago
Spiking neural P systems with extended rules: universality and languages
We consider spiking neural P systems with rules allowed to introduce zero, one, or more spikes at the same time. The motivation comes both from constructing small universal systems...
Haiming Chen, Mihai Ionescu, Tseren-Onolt Ishdorj,...