Sciweavers

11949 search results - page 235 / 2390
» Some results on (a:b)-choosability
Sort
View
IJWMC
2006
112views more  IJWMC 2006»
15 years 1 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
JGO
2008
98views more  JGO 2008»
15 years 1 months ago
Duality for almost convex optimization problems via the perturbation approach
Abstract. We deal with duality for almost convex finite dimensional optimization problems by means of the classical perturbation approach. To this aim some standard results from th...
Radu Ioan Bot, Gábor Kassay, Gert Wanka
ITA
2006
15 years 1 months ago
Probabilistic models for pattern statistics
In this work we study some probabilistic models for the random generation of words over a given alphabet used in the literature in connection with pattern statistics. Our goal is t...
Massimiliano Goldwurm, Roberto Radicioni
DISOPT
2007
109views more  DISOPT 2007»
15 years 1 months ago
Sequential pairing of mixed integer inequalities
We present a scheme for generating new valid inequalities for mixed integer programs by taking pairwise combinations of existing valid inequalities. Our scheme is related to mixed...
Yongpei Guan, Shabbir Ahmed, George L. Nemhauser
JCP
2006
129views more  JCP 2006»
15 years 1 months ago
Cancer Classification With MicroRNA Expression Patterns Found By An Information Theory Approach
Abstract-- Some non-coding small RNAs, known as microRNAs (miRNAs), have been shown to play important roles in gene regulation and various biological processes. The abnormal expres...
Yun Zheng, Chee Keong Kwoh