Sciweavers

958 search results - page 81 / 192
» Resolving the Micropayment Problem
Sort
View
CSDA
2007
105views more  CSDA 2007»
14 years 10 months ago
GSA-based maximum likelihood estimation for threshold vector error correction model
The log-likelihood function of threshold vector error correction models is neither differentiable, nor smooth with respect to some parameters. Therefore, it is very difficult to ...
Zheng Yang, Zheng Tian, Zixia Yuan
DAM
2007
60views more  DAM 2007»
14 years 10 months ago
Restricting SBH ambiguity via restriction enzymes
The expected number of n-base long sequences consistent with a given SBH spectrum grows exponentially with n, which severely limits the potential range of applicability of SBH even...
Steven Skiena, Sagi Snir
JSS
2006
118views more  JSS 2006»
14 years 10 months ago
Assessment of eco-security in the Knowledge Grid e-science environment
Ecological security is an important basis of the entire human security system, the cornerstone for human survival. Knowing the status of ecological security is crucial for making ...
Xiaoqing Shi, Jingzhu Zhao, Ouyang Zhiyun
AMC
2005
218views more  AMC 2005»
14 years 10 months ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
APPML
2005
55views more  APPML 2005»
14 years 10 months ago
Recovering a phylogenetic tree using pairwise closure operations
A fundamental task in evolutionary biology is the amalgamation of a collection P of leaf-labelled trees into a single parent tree. A desirable feature of any such amalgamation is ...
Katharina T. Huber, Vincent Moulton, Charles Sempl...