Sciweavers

7225 search results - page 1222 / 1445
» On the Computational Power of Biochemistry
Sort
View
121
Voted
TIT
2008
187views more  TIT 2008»
15 years 1 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
TSP
2008
102views more  TSP 2008»
15 years 1 months ago
Bias Corrected PSD Estimation for an Adaptive Array With Moving Interference
We address the issue of computing power spectral density (PSD) estimates at the output of a beamforming sensor array in the presence of strong moving interference. It is shown that...
Brian D. Jeffs, Karl F. Warnick
130
Voted
ATMOS
2010
128views Optimization» more  ATMOS 2010»
15 years 24 days ago
Robust Train Routing and Online Re-scheduling
Train Routing is a problem that arises in the early phase of the passenger railway planning process, usually several months before operating the trains. The main goal is to assign...
Alberto Caprara, Laura Galli, Leo G. Kroon, G&aacu...
CIKM
2010
Springer
15 years 13 days ago
Understanding retweeting behaviors in social networks
Retweeting is an important action (behavior) on Twitter, indicating the behavior that users re-post microblogs of their friends. While much work has been conducted for mining text...
Zi Yang, Jingyi Guo, Keke Cai, Jie Tang, Juanzi Li...
CORR
2010
Springer
87views Education» more  CORR 2010»
15 years 12 days ago
Using Evolution Strategy with Meta-models for Well Placement Optimization
Optimum implementation of non-conventional wells allows us to increase considerably hydrocarbon recovery. By considering the high drilling cost and the potential improvement in we...
Zyed Bouzarkouna, Didier Yu Ding, Anne Auger
« Prev « First page 1222 / 1445 Last » Next »