Sciweavers

1662 search results - page 217 / 333
» Privately Finding Specifications
Sort
View
108
Voted
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 26 days ago
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad ho...
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rat...
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 26 days ago
Locating phase transitions in computationally hard problems
We discuss how phase-transitions may be detected in computationally hard problems in the context of anytime algorithms. Treating the computational time, value and utility functions...
B. Ashok, T. K. Patra
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 26 days ago
Detecting communities of triangles in complex networks using spectral optimization
The study of the sub-structure of complex networks is of major importance to relate topology and functionality. Many efforts have been devoted to the analysis of the modular struc...
Belkacem Serrour, Alex Arenas, Sergio Gómez
80
Voted
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 26 days ago
Investigating the Performance of an Adiabatic Quantum Optimization Processor
We calculate median adiabatic times (in seconds) of a specific superconducting adiabatic quantum processor for an NP-hard Ising spin glass instance class with up to N = 128 binary ...
Geordie Rose, Kamran Karimi, Neil G. Dickson, Fira...
121
Voted
CORR
2010
Springer
74views Education» more  CORR 2010»
15 years 26 days ago
Significance of Classification Techniques in Prediction of Learning Disabilities
The aim of this study is to show the importance of two classification techniques, viz. decision tree and clustering, in prediction of learning disabilities (LD) of school-age chil...
Julie M. David, Kannan Balakrishnan