Sciweavers

2340 search results - page 40 / 468
» Second quarter 2008
Sort
View
DM
2006
79views more  DM 2006»
14 years 11 months ago
Restricted even permutations and Chebyshev polynomials
We study generating functions for the number of even (odd) permutations on n letters avoiding 132 and an arbitrary permutation on k letters, or containing exactly once. In sever...
Toufik Mansour
IJAC
2008
63views more  IJAC 2008»
14 years 11 months ago
The Management Challenge Online: e-Learning in Practice
- The Management Challenge Online (TMCO) is a ten week online management course that begins for a cohort of 30 in the week immediately following their attendance at a residential t...
Anna Peachey, Sarah Walshe
IJBC
2008
50views more  IJBC 2008»
14 years 11 months ago
Secure Data Transmission Based on Multi-Input Multi-Output Delayed Chaotic System
This paper deals with the problem of secure data transmission based on multi-input multi-output delayed chaotic systems. A new multi-input secure data transmission scheme is propo...
Gang Zheng, Driss Boutat, Thierry Floquet, Jean-Pi...
IPM
2008
90views more  IPM 2008»
14 years 11 months ago
Local relational string and mutual matching for image retrieval
Exhibiting new features and likely related matching techniques to efficiently retrieve images from databases remains an open problem. This paper is first devoted to such a novel d...
Adel Hafiane, Bertrand Zavidovique
JSYML
2008
71views more  JSYML 2008»
14 years 11 months ago
Regular ultrafilters and finite square principles
We show that many singular cardinals above a strongly compact cardinal have regular ultrafilters D that violate the finite square principle fin ,D introduced in [3]. For such ult...
Juliette Kennedy, Saharon Shelah, Jouko A. Vä...