Sciweavers

495 search results - page 87 / 99
» Signed quorum systems
Sort
View
CONNECTION
2004
94views more  CONNECTION 2004»
14 years 9 months ago
Evolving internal memory for T-maze tasks in noisy environments
In autonomous agent systems, internal memory can be an important element to overcome the limitations of purely reactive agent behaviour. This paper presents an analysis of memory r...
DaeEun Kim
CORR
2004
Springer
107views Education» more  CORR 2004»
14 years 9 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
ICPR
2010
IEEE
14 years 8 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan
MST
2010
140views more  MST 2010»
14 years 8 months ago
Approximability of Clausal Constraints
We study a family of problems, called Maximum Solution (Max Sol), where the objective is to maximise a linear goal function over the feasible integer assignments to a set of variab...
Peter Jonsson, Gustav Nordh
CISS
2011
IEEE
14 years 1 months ago
Stable manifold embeddings with operators satisfying the Restricted Isometry Property
—Signals of interests can often be thought to come from a low dimensional signal model. The exploitation of this fact has led to many recent interesting advances in signal proces...
Han Lun Yap, Michael B. Wakin, Christopher J. Roze...