Sciweavers

368 search results - page 27 / 74
» System BV is NP-complete
Sort
View
CN
2007
124views more  CN 2007»
15 years 15 days ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
160
Voted
COMCOM
2007
119views more  COMCOM 2007»
15 years 15 days ago
A new high rate adaptive wireless data dissemination scheme
With the increasing popularity of wireless networks and mobile computing, data broadcasting has emerged as an efficient way of delivering data to mobile clients having a high degr...
Petros Nicopolitidis, Georgios I. Papadimitriou, M...
89
Voted
IJON
2006
66views more  IJON 2006»
15 years 14 days ago
The interaction between facilitation and depression of two release mechanisms in a single synapse
The synapse from the lateral pyloric (LP) to the pyloric dilator (PD) neuron in the stomatogastric nervous system of the crab Cancer borealis has both a graded and a spike-mediate...
Lian Zhou, Robert LoMauro, Farzan Nadim
IJON
2006
68views more  IJON 2006»
15 years 14 days ago
Dendritic cable with active spines: A modelling study in the spike-diffuse-spike framework
The spike-diffuse-spike (SDS) model describes a passive dendritic tree with active dendritic spines. Spine-head dynamics is modelled with a simple integrate-and-fire process, whil...
Yulia Timofeeva, Gabriel J. Lord, Stephen Coombes
106
Voted
IVC
2006
163views more  IVC 2006»
15 years 14 days ago
Adaptive fingerprint image enhancement with fingerprint image quality analysis
Accurate minutiae extraction from fingerprint images is heavily dependent on the quality of the fingerprint images. In order to improve the performance of the system, much effort ...
Eun-Kyung Yun, Sung-Bae Cho